f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000180)) [ 419.535551] kernel msg: ebtables bug: please report to author: bad policy 21:31:10 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x8) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687962555170ddac34b99589430d3f0eaa790e4859f0936b7297115d493a65273f21a75ddb0aab9c119d1cc60079daa8e9234ace4eb66a9dc43da1c82ce4e6cb3d1b4125d2a7", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',permit_directyo,fsuuid=yuwc9fww-810d-6v4t-w\x004a-b\x00\x007c5>g,audit,dont_measure,\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00`\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x91}], 0x1, 0x0) [ 419.724334] net_ratelimit: 18 callbacks suppressed [ 419.724382] protocol 88fb is buggy, dev hsr_slave_0 [ 419.734465] protocol 88fb is buggy, dev hsr_slave_1 [ 419.749591] kvm_hv_set_msr: 13 callbacks suppressed [ 419.749606] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 21:31:11 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 419.839723] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 21:31:11 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x123) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() r2 = geteuid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 419.885220] kernel msg: ebtables bug: please report to author: bad policy [ 419.923486] kvm: pic: non byte read [ 419.945278] kvm: pic: non byte read [ 419.964377] protocol 88fb is buggy, dev hsr_slave_0 [ 419.969525] protocol 88fb is buggy, dev hsr_slave_1 [ 419.976410] kvm: pic: non byte read 21:31:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x92}], 0x1, 0x0) 21:31:11 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000180)=0xc) 21:31:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@null, @bcast, 0x1, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000440)={0xa, 0x4, 0x6}, 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 419.995782] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 [ 420.034684] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 21:31:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:11 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x3}}, 0x18) [ 420.080835] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 420.137177] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000000d data 0x0 [ 420.169385] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 [ 420.199841] kernel msg: ebtables bug: please report to author: bad policy [ 420.201524] kvm [19342]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 21:31:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x9a}], 0x1, 0x0) [ 420.245993] kvm [19342]: vcpu0, guest rIP: 0x88f2 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 [ 420.284001] kvm: pic: non byte read [ 420.287831] protocol 88fb is buggy, dev hsr_slave_0 [ 420.292921] protocol 88fb is buggy, dev hsr_slave_1 21:31:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000180)={0x1, 0x0, {0x1e8, 0x2, 0x2010, 0x2, 0xb, 0x7}}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:11 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000100)={0x7}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365705f69643d64006e185a78ca500fadf495e901171251604599c8f4d06d47442c7122747d5b79909536e0e3e910511d6f5b3d1e024dddb3c6e93ad57c9072d7a8fc2bbe100da4730da427d7db08ca5161c4a66cfb231e9742bb5cff1c70531b6dc75f645e92fdc14980e234ee7856e9400000008bb7c9c12d95085399e4727e8700ec5d7797a569384eda8dfa2700ad15b361d2268dc5bb0c2f3fcb528c40d834ebdf7975301439466dc0e8235873d0020a80", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000180)=0x4) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x780c) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:11 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x803, 0x3) pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f00000003c0)={0x7ff}, 0x0, 0x0) 21:31:11 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f00006d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d10e1c8871572328963041cf32d7fca5b9ba302e3a6681c99b53672d2828258f2bbde57032fb80f1c32c35ac416b404acab818a4f3c7bf6d422dc6db8ddedac37169fe1bab6abefb55835840142bac78ddc9e5dd0bb1407f893", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="2c01"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0xffffffffffffff67, @mcast1, 0xfffffffffffff866}}, 0x2, 0x7, 0x6, 0x3f, 0x20}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000640)={r3, 0x75, "884dbcda2956aecbb6445d147553f4599ebf4c4cd625878b323b9be1aefed8c3810d836c01b9fa63dede9cd152c6de0889d9dd7525c73e167fc940e00bff23d2dcd13a7ba25a3a913dc08ebe54f03fe7c9881082788898239125adeb42d63efdcf51c7c4d66038938907fd1c1d322556b4dc5c5f99"}, &(0x7f00000006c0)=0x7d) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x4bb1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r4, 0x2c3b}, &(0x7f0000000300)=0x8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'teql0\x00', r5}) 21:31:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x9d}], 0x1, 0x0) 21:31:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x02\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:11 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x10000) 21:31:11 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2000, 0x0) clone(0x10004101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x721142, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x800000012, &(0x7f0000000380)={0x0, 0x0, 0xfffffffffffffff3}) [ 420.524349] protocol 88fb is buggy, dev hsr_slave_0 [ 420.529509] protocol 88fb is buggy, dev hsr_slave_1 21:31:11 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xa6}], 0x1, 0x0) [ 420.610779] kernel msg: ebtables bug: please report to author: bad policy [ 420.622527] kvm [19695]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 420.671487] kvm: pic: non byte read [ 420.682566] audit: type=1400 audit(1551303071.996:552): avc: denied { sys_ptrace } for pid=19709 comm="syz-executor.1" capability=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 420.689927] kvm: pic: non byte read 21:31:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/83, 0x53, 0x1, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666417", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 420.753890] kvm: pic: non byte read 21:31:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xb4}], 0x1, 0x0) 21:31:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) epoll_create(0x84) 21:31:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x03\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:12 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_Id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c10"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xc5}], 0x1, 0x0) [ 420.924356] protocol 88fb is buggy, dev hsr_slave_0 [ 420.929460] protocol 88fb is buggy, dev hsr_slave_1 [ 421.001742] kernel msg: ebtables bug: please report to author: bad policy [ 421.014571] kvm: pic: non byte read [ 421.023450] kvm: pic: non byte read [ 421.033088] kvm: pic: non byte read 21:31:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xce}], 0x1, 0x0) 21:31:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7ab290ca0000, 0x10000) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000080)={0x2bd, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) r2 = request_key(&(0x7f0000000400)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000440)='fd', 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r2, &(0x7f0000000240)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, r3) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x40000) 21:31:12 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2000, 0x0) clone(0x10004101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x721142, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x800000012, &(0x7f0000000380)={0x0, 0x0, 0xfffffffffffffff3}) 21:31:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xcf}], 0x1, 0x0) 21:31:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x04\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:12 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x8, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xda49, 0x80000) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x2d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:12 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@obj_role={'obj_role'}}, {@subj_role={'subj_role', 0x3d, '/'}}, {@smackfshat={'smackfshat', 0x3d, 'vboxnet1]wlan0cgroupself'}}, {@uid_gt={'uid>', r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x3b, 0x35, 0x65, 0x64, 0x30, 0x76, 0x31, 0x7f], 0x2d, [0x64, 0x77, 0x76, 0x36], 0x2d, [0x77, 0x30, 0x66, 0x3c], 0x2d, [0x7d, 0x33, 0x61, 0x34], 0x2d, [0x35, 0x77, 0x77, 0x3357ac4b0d671cae, 0x32, 0x7f, 0x67, 0x35]}}}, {@appraise='appraise'}]}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000001c0)={0x0, 0x0, [0x9, 0x7, 0x2, 0x52d, 0xffff, 0x5, 0xb727, 0x7]}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x5, 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 421.657445] kernel msg: ebtables bug: please report to author: bad policy 21:31:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xdc}], 0x1, 0x0) 21:31:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getpeername$inet(r0, &(0x7f0000000040), &(0x7f0000000200)=0x10) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:13 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) 21:31:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080), 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x05\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xdd}], 0x1, 0x0) [ 421.966686] kernel msg: ebtables bug: please report to author: bad policy 21:31:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x206080, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0xe8) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50}, 0x50) 21:31:13 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x101000, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x2e4, 0x10, 0x2, 0x70bd29, 0x25dfdbfb, {0xa}, [@generic="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", @nested={0x1d0, 0x5c, [@typed={0x14, 0x2f, @ipv6=@loopback}, @generic="301b7e1a55a83ede5f42d69272978935c4ef1e9ada02c47ddd7c72967b8d61bc79cd2a77a851ad732db4c1a653ec9ddedb28e60ef7bc73e58a015719270e764e68d5440a48c43dc0117e52c5ade0613e06", @generic="34967009e180fb0561374e90a6cc2b5f73a3fe8e9d6f1d7d14248afbbbf11634d704791d5065b3424dd6cd08bb12bb734f77baa61e3f4459bbeb2a258067344ff32e5323b0b762c0dd5055b1203f2935e1ae337be43fe121390bf88c90a23fb03828511f9144f6b8e6bcfc4421dc52a2873a687f187355db5b7faf95dab05f3844bb4ab73de1841e65b60011ef3ac73f07710be48fa5ff62c24f5dbd4766", @generic="7879d965689e42a38cb3bd56c865968c05330e0c7080d8c09ac9f1a8c6609c7d4122ed2bf5d77015070eef39b8eaf339165ff62a91b0e9", @generic="ca81d7b493d29afd121e44ec89e2b63804f49ebba6ad676c237016f3d7170b99a9b59dd0cbcb7bf2ea6b39b4ebb22fc1047c9681bc871711194a173985cfc79a797f34a5462499340c1e3e41a09dec8d3b9187b640fb80df3dbb54e20b01c67b806eea5410147206746d9a921cf4c32bf0d8fa5fbc12def9b2d7a70f36fff0bca654b84d", @typed={0x4, 0x3f}, @typed={0x8, 0x36, @str='fd'}]}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x4004}, 0x800) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000240)={0x3, "9ba3a3"}, 0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x06\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:13 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x81) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000240)={0x1f, &(0x7f0000000040)="98278866503f311bf33cb61a7549df41b39cb701d2f89044e1fb927b911221"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="ee68ccaad9d2e986051fe93284cf775bd2b61d4a38a3882f83554bb3bb7b6e96cac0993db856339862422817c11d2e7abff6dfb8bf75aad865ca1d082b730546f471db940db1039ca9d944a9e5bea7f5aa8a331215776952aa9cdbbef9976e44c41762c844722c3b42f2f12885d1e11a5b6204d996306dc945af24b65f9e27a0a59c469bdad422897c308b2bf081d21d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643dc773dfdb0435288b00470647a6b03dd321ddf041eebe1445efdb65c3b0d8694b618ee450f4f21c5e5df600507209b6093c4920d60867398311076173ddb8437ffcce0b89c082140edf69a12f0bf49824200fb09d7d943338e83473ec5369ed7d277c172753214eef90ebaaa5c520ba28c15e1cdf5dc58379e99bba2aab04607d1e669171762cb12260aed5c8dbcb94c48b156b6bf1df81bcf66705507398595eb8c1f14b75b2fc3cf44b24b53bdfb05ab9ee552679971aa838e20688677e06b25b5526fdb5b08f198ff792", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000180)) umount2(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd) 21:31:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x9) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x40) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xde}], 0x1, 0x0) [ 422.387258] kernel msg: ebtables bug: please report to author: bad policy 21:31:13 executing program 0: mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x1080004, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x3ff}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x81}}], [{@smackfstransmute={'smackfstransmute'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@appraise_type='appraise_type=imasig'}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0039343053daadde2b10aeacdad646e473fd513a044152f25dabc06066d2"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xe6}], 0x1, 0x0) 21:31:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) 21:31:13 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\a\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:13 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4b67f8ffffffffffffff", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)={0x4000000, 0x3000000000000, 0x33}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:13 executing program 1: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f00000002c0)='net/ra\xef=\xcau\xe6)riD\xd3\xdc\xf66\xcd6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = msgget$private(0x0, 0x10) msgctl$IPC_RMID(r5, 0x0) sendfile(r1, r3, &(0x7f0000000000)=0x4b, 0x80000001) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x642000) 21:31:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xe9}], 0x1, 0x0) 21:31:14 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 422.691207] kernel msg: ebtables bug: please report to author: bad policy 21:31:14 executing program 1: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000140)=""/108, 0x6c, 0x100000001, &(0x7f0000000000)={0x0, 0x1c9c380}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='::,.\nnullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 422.893022] libceph: resolve '. [ 422.893022] nullb' (ret=-3): failed [ 422.900930] libceph: parse_ips bad ip '::,. [ 422.900930] nullb' 21:31:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(&(0x7f0000000040)={0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000180)="66baa000b800000100efc7442400ec000000c744240260000000c7442406000000000f011424360f01d10f793366ba210066ed660f3832ce0fc71dad5f0000c4e2c997bd00000000c4c22503b296bc000066baf80cb8702e208aef66bafc0ced", 0x60}], 0x1, 0x8, &(0x7f0000000200)=[@dstype0={0x6, 0x7}, @cstype3={0x5, 0xa}], 0x2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:14 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@uid_lt={'uid<', r1}}, {@appraise='appraise'}, {@appraise='appraise'}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@smackfsroot={'smackfsroot', 0x3d, '&uservboxnet1/nodev'}}]}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00 \x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xf0}], 0x1, 0x0) 21:31:14 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x184, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6d82}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x44fa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x37}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb0}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x376a0000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9f, @dev={0xfe, 0x80, [], 0x26}, 0x6a88}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffff800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffffc1}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20ab}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x40}, 0x41) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x7) 21:31:14 executing program 1: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000140)=""/108, 0x6c, 0x100000001, &(0x7f0000000000)={0x0, 0x1c9c380}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='::,.\nnullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 423.305066] kernel msg: ebtables bug: please report to author: bad policy [ 423.338856] libceph: resolve '. [ 423.338856] nullb' (ret=-3): failed 21:31:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0xf7}], 0x1, 0x0) 21:31:14 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d7030303030303030303030303030303030312bfd30303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00?\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 423.428102] libceph: parse_ips bad ip '::,. [ 423.428102] nullb' 21:31:14 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0069c803003fbf071f1e"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:31:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000180)={0x6}, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x103}], 0x1, 0x0) 21:31:14 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x184, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6d82}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x44fa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x37}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb0}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x376a0000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9f, @dev={0xfe, 0x80, [], 0x26}, 0x6a88}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffff800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffffc1}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20ab}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x40}, 0x41) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x7) [ 423.609674] kernel msg: ebtables bug: please report to author: bad policy 21:31:15 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) uselib(&(0x7f0000000040)='./file0\x00') 21:31:15 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_GET_KEEPCAPS(0x7) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00`\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x109}], 0x1, 0x0) 21:31:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="85000000000000005f00000000"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 21:31:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sched\x00') getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000980)={"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"}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000d80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x7f0, 0x4d8, 0x218, 0x328, 0x5f0, 0x328, 0x720, 0x720, 0x720, 0x720, 0x720, 0x6, &(0x7f00000001c0), {[{{@uncond, 0x0, 0xf0, 0x218, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:hald_acl_exec_t:s0\x00'}}}, {{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x25}, [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffffff], 'lo\x00', 'bcsf0\x00', {}, {0xff}, 0x2e, 0x1, 0x2, 0x1c}, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, [], 0x25}, @ipv6=@rand_addr="63bcd9a21849c8293dc9d1e98f672091", 0x1b, 0x7fff, 0x40}}}, {{@ipv6={@empty, @rand_addr="7c8544e7fc6c705538c3306509b11679", [0xffffffff, 0xff000000, 0xffffffff], [0xff000000, 0xffffffff, 0xff, 0xffffff00], 'bpq0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0x1f, 0x3, 0x7, 0x1}, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x7fffffff, 0x1, 0x10000, 0x3, @rand_addr="ba7688f14fb946cb3752b7b6c7d645a2", @loopback, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, [0xffffffff, 0xff, 0xffffffff], [0xff, 0xff, 0xffffff00, 0xff000000], [0x0, 0x0, 0xffffffff], 0x1000, 0x1}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x4d3, 0x4d4, 0x9f8, 0x100, 0x1}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x6}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x3b}}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x4, 0x0, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x850) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:15 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x13) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @initdev}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000040)=0xfffffffffffffee8) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x4}, 0x10) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, 'GPL]'}}, {@fsname={'fsname', 0x3d, '-trusted'}}, {@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', r2}}, {@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 21:31:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0xa0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 423.894708] kernel msg: ebtables bug: please report to author: bad policy 21:31:15 executing program 1: futex(0x0, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) getpgrp(0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000240)='./file0\x00', r1, r2) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="02000000010000000000000004000800000000001000020000000000200000000078000000"], 0x24, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x100000001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0x0, 0x100}, &(0x7f0000000100)=0xc) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, 0x0, {0xfffffffffffffffe}}, 0x18) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) request_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='GPL/{($)\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="9f48ab4ad0c0dc06396712b30b9d99c46800637ad62c75d30a0ff72225a676cef2c136704d058fc7969b14f1e82553e64337076466c0aa6ff253c83bdd", 0x3d, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000004c0)='.dead\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, r4) 21:31:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x10a}], 0x1, 0x0) 21:31:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x02\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:15 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4010080}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x200, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:15 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000180)={{0xffffffffffffffff, 0x2, 0x9, 0x0, 0x9}, 0xfffffffffffffffd, 0x8, 0x2}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="5cdd4ea02aab100d7f2167e400ba258b30b7de22cd1d0eee62169c16db083b4690f4afc57bcd1d41b05eae35fcd0", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000000210000000000d834d131e784c918feb593d915c029ab841e1c3fc4426939aa3a40b809e0d1023ffcf0c47b56da0b7e7623125094cbbfb47458eb546729f0cc721969e1dff7a9f7871256997a1d988de3341dce2e4ee7a11eb29d38cc55b3fcb0f224507e6615903be3ed738243cc88208d10ad6ec7eb65978493b14be6b8ce11b2ac0e0e95e2d759f8e0db6c3f5433f0a1216aacbc1d0fab42665f0f67c1714fa2465d80d99f773eb8ed4a2790a4bb1b2033bc08903703ab0bd3f9"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 424.239136] kernel msg: ebtables bug: please report to author: bad policy 21:31:15 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\b']) mlockall(0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000300)=0x4) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000180)=""/169, &(0x7f0000000040)=0xa9) 21:31:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:15 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1f5cf8768b9401fb6f8e90b263f0d1b9f4152777acbb692c608e71779e1793aed3fa7ac0401c7366e985c47266b4a8cbcee672b4d8fa50807dedc0f3cbe301e97b70fbb80ff31dd43945", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x110}], 0x1, 0x0) 21:31:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x03\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:15 executing program 1: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x20000000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0xfffd) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x3b, @broadcast, 0x4e21, 0x2, 'wlc\x00', 0x10, 0x80, 0x59}, 0x2c) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000180)) 21:31:15 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e20, @multicast1}}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpeername$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, {0x8001, 0xffffffffffffff84, 0x3, 0x0, 0xbc, 0x3}}, 0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030284130303033ad104f47b10d3a666e80c1d75d56cdec8a303030303130", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 424.502953] kernel msg: ebtables bug: please report to author: bad policy 21:31:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x113}], 0x1, 0x0) 21:31:15 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:15 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x80d1) r2 = socket$netlink(0x10, 0x3, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000180)={0xffffffff, 0x0, {0x2, 0x3, 0x6, 0x1, 0x5}}) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v1={0x1000000, [{0x5, 0x5}]}, 0xc, 0x1) write$P9_RSTAT(r0, &(0x7f00000002c0)={0x4b, 0x7d, 0x2, {0x0, 0x44, 0x4, 0x91a3, {0xc, 0x1, 0x7}, 0x8200000, 0x5e12, 0x401, 0x4, 0x5, 'TIPC\x00', 0x5, 'TIPC\x00', 0x7, 'trusted'}}, 0x4b) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000003c0)={@vsock={0x28, 0x0, 0x2710, @hyper}, {&(0x7f0000000340)}, &(0x7f0000000380), 0x1}, 0xa0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000480)=0x6, 0x4) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000500)={{0x0, 0x989680}, {r3, r4+10000000}}, &(0x7f0000000540)) accept$inet6(r2, &(0x7f0000000580)={0xa, 0x0, 0x0, @empty}, &(0x7f00000005c0)=0x1c) r5 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0x40, 0x0) fcntl$notify(r5, 0x402, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000680)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000700)={0x10, 0x30, 0xfa00, {&(0x7f0000000640), 0x4, {0xa, 0x4e21, 0x88, @empty, 0x3ff}, r6}}, 0x38) syz_open_dev$binder(&(0x7f0000000740)='/dev/binder#\x00', 0x0, 0x2) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000780)=0x3) ioctl$sock_netrom_SIOCDELRT(r5, 0x890c, &(0x7f00000007c0)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0='bpq0\x00', 0x7ff, 'syz0\x00', @bcast, 0x10000, 0x2, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000840)={@mcast2, 0x80000001, 0x2, 0x1, 0xe, 0xffffffffffffffff, 0x5}, &(0x7f0000000880)=0x20) mknod$loop(&(0x7f00000008c0)='./file0\x00', 0x1000, 0x1) ioctl$CAPI_NCCI_GETUNIT(r5, 0x80044327, &(0x7f0000000900)=0x7f) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000940)) ioctl$TIOCCBRK(r0, 0x5428) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000980)={0x0, 0x7f}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000a00)={r7, 0x7, 0x2, [0x6bc, 0x1f]}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000a80)=@assoc_value, &(0x7f0000000ac0)=0x8) ioctl$RTC_VL_READ(r5, 0x80047013, &(0x7f0000000b00)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000b40)=@sack_info={r8, 0x7}, 0xc) 21:31:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x04\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:16 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) umount2(&(0x7f0000000000)='./file0\x00', 0x6) [ 424.711184] audit: type=1400 audit(1551303076.026:553): avc: denied { create } for pid=21056 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 [ 424.740996] QAT: Invalid ioctl [ 424.760548] QAT: Invalid ioctl [ 424.780396] QAT: Invalid ioctl [ 424.790898] QAT: Invalid ioctl 21:31:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x11c}], 0x1, 0x0) [ 424.794463] audit: type=1400 audit(1551303076.066:554): avc: denied { setopt } for pid=21056 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 [ 424.801474] kernel msg: ebtables bug: please report to author: bad policy [ 424.828834] QAT: Invalid ioctl [ 424.846517] QAT: Invalid ioctl [ 424.857154] QAT: Invalid ioctl [ 424.867674] QAT: Invalid ioctl [ 424.900877] audit: type=1400 audit(1551303076.076:555): avc: denied { accept } for pid=21056 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 [ 425.084336] net_ratelimit: 22 callbacks suppressed [ 425.084345] protocol 88fb is buggy, dev hsr_slave_0 [ 425.094427] protocol 88fb is buggy, dev hsr_slave_1 21:31:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x20100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:16 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x4008) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001680)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001780)=0xe8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x555, 0x6, &(0x7f00000015c0)=[{&(0x7f0000000300)="2d9f2ee1697ad49ffa7992e9f5eaac6f6518a8d68b311b691efd67b4214b5c0d8631de2befdf7f9977b842cf1d0166a587f5bc7c7aa4d29a137b0a22afb655e47784d4dadc0baa817ee63049af055f11635cfda7320633c2a12d643c88de7504e328019a715858f192279e47d8849bd774a9b1d83aee240915ec33fc45dc7ce971315ad693e43c8d9aec2a1a25f22584860f6aaba0537a48c03095a7ed41855091f64db9bba0a6a8976086db0e6333bd4f5abbc9f38ca916d677999677f83290b94d060c0afb6950897c6379915a7c724920c433e9ade38002a7524d72461feb6208d3e17f3f231ecf", 0xe9, 0x8}, {&(0x7f0000000400)="99de8c66338765f320fc7ba00115c06843e0135b6d4c487ebee5a99752d0d3c2e1c3da74d1fedfccefef015fa586c2a2aad8f53dee1d71db33ac725e9009c8d4f36f295bbd559c54115debb564882d4f77ed74b6854a3a591326954795a8b4f34f7b614b2a09c8dfc6a6194d8aa479af3202bf8f33de8b54579976e3bd2e11e39f65e69632e653cd3ef5568bed00c7618a77406ac7201040ff870208931d15a8c0e57a61767b3e4f1ec20d4e9a8be4d0110243c085aac8f3f20729ac1a488370798a58afedd367f8b8f2d3bafca98744f22cfaac88420f30cef5d4910d028d338b29dc97bf6e", 0xe6, 0x400}, {&(0x7f00000001c0)="e69faaaf36ab88c5772ed6a1cc0eb26393514c8e98", 0x15, 0xc1e}, {&(0x7f0000000500)="24506717cb4c59fe6b67dd9b6d76591008de3d7c2695fa608f5633c4053891dc6c09b3dba0b698468e5331ff3fae668cfd9873f2d15f9766fb2ca6a4bcd361d1d397cd76857b999e400d47f8a0475d3ae4ba3fde27df5721d87316963a663e4591e1927d5ccac5ffa8c35959900f373714dec7dad94ac04f47aa52be4d982e193b97157e91d676b180cb8680c5", 0x8d, 0x3}, {&(0x7f0000000200)="f3ba0f99bb24bc09aab1bfe8028c2d94bf576d20fdbc354e0cbd54f99d472d0ea975c7b96d69215743b28b904d67997a24c90746c4f9205739ac3e9881fceea305359bad4c25", 0x46, 0x8dad}, {&(0x7f00000005c0)="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", 0x1000, 0x20}], 0x1, &(0x7f00000017c0)={[{@space_cache_v2='space_cache=v2'}, {@compress_force='compress-force'}, {@degraded='degraded'}, {@device={'device', 0x3d, './file0'}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_lt={'euid<', r1}}, {@audit='audit'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'user_id'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 21:31:16 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(r0) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052fe13cb000400000c2dd5591ad1636fc150f4376da3aabc0af8632aacbcacb1f46330de22927e423701f0b0b7b0c19de60d25def3899fa14"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:31:16 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x8, @rand_addr="7cfd2b922dccb03545a73513b03e05b8", 0x2}}, 0x24) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 21:31:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x122}], 0x1, 0x0) 21:31:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x05\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:16 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x5, &(0x7f0000000000)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, @generic={0xfffffffffffffff9, 0xe33, 0x3f, 0x10001, 0x2}, @exit], &(0x7f0000000040)='GPL\x00', 0x3f, 0xc4, &(0x7f0000000080)=""/196, 0x41000, 0x1, [], r0, 0xd}, 0x48) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000380)={'bpq0\x00', @local}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, 0x0, 0xffffffffffffffff) 21:31:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x12b}], 0x1, 0x0) [ 425.454631] kernel msg: ebtables bug: please report to author: bad policy 21:31:16 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) getrandom(&(0x7f0000000180)=""/183, 0xb7, 0x1) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000240)) sendto(r0, &(0x7f0000000380)="5a18c011dba04ae297b4f1f842f0f6534d19ef7d426cc5acdf0d07c15aae22b27e0f8825a6ef73e57ee85557c28f77e7bcc94074540acf021964a484bec5bb97b9ac16abfcf4bbec0f5af175199a5eda8731a10b3ae57506306e4a4675b2a31851813b6dbad1ecacea0272f944e54e025860246e7d252c63c95b980b8ad61ec0414c4773f90718e6c52de2", 0x8b, 0x800, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x3, 0x0, 0x3, {0xa, 0x4e20, 0xaf35, @local, 0x92}}}, 0x80) umount2(&(0x7f0000000000)='./file0\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x10001) 21:31:16 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6f72e70df76f75705f6964bd", @ANYRESDEC=0x0, @ANYBLOB="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"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040), 0x4) [ 425.569844] kvm_hv_set_msr: 41 callbacks suppressed [ 425.569861] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 425.598379] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 21:31:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x06\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x138}], 0x1, 0x0) [ 425.661735] picdev_read: 12 callbacks suppressed [ 425.661742] kvm: pic: non byte read [ 425.689338] kvm: pic: non byte read [ 425.706102] kvm: pic: non byte read [ 425.723148] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 [ 425.754644] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 425.761464] kernel msg: ebtables bug: please report to author: bad policy [ 425.793426] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 425.804320] protocol 88fb is buggy, dev hsr_slave_0 [ 425.809400] protocol 88fb is buggy, dev hsr_slave_1 [ 425.822737] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000000d data 0x0 [ 425.832598] kvm [21185]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 21:31:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) msgget(0x1, 0x102) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x3, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040)=0x8001, 0x4) r2 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84306910000003900090035000c00060000001900150007000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 21:31:17 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:17 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x139}], 0x1, 0x0) 21:31:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\a\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 425.964353] protocol 88fb is buggy, dev hsr_slave_0 [ 425.969472] protocol 88fb is buggy, dev hsr_slave_1 [ 426.016107] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.1'. 21:31:17 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7ff, 0x8000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f00000003c0)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x5}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000004c0)=r1, 0x4) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000380)={0x101, 0x100000000}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom(r4, &(0x7f0000000040)=""/17, 0x11, 0x40, &(0x7f0000000300)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80) umount2(&(0x7f0000000000)='./file0\x00', 0x200000000000000) 21:31:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x146}], 0x1, 0x0) [ 426.116263] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.1'. 21:31:17 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000100)={0x78, 0x2fb8adce, 0x4, 0x6, 0x2}) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 426.204328] protocol 88fb is buggy, dev hsr_slave_0 [ 426.209444] protocol 88fb is buggy, dev hsr_slave_1 21:31:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x63b795ff26adef27) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000080)=0x3f) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000380)={0x5, 0x400000000, 0x6, 'queue1\x00', 0x7}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x140000}, &(0x7f0000000300)=0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x12400, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000200)={r4, 0x9, 0x100000000}, 0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0xa0643, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x4010744d, &(0x7f0000000000)) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 426.436632] kvm [21440]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 426.470824] kvm [21440]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 426.492089] kvm: pic: non byte read [ 426.503150] kvm: pic: non byte read [ 426.524332] protocol 88fb is buggy, dev hsr_slave_0 [ 426.529486] protocol 88fb is buggy, dev hsr_slave_1 21:31:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000200)=0x1) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0000309d4385f0743fb55c57690888efe016aea3679bc18035b6d779ac5ec7ef9000985d014875e609229df17597f37d5fc91bad4611404ef85cc2cd15f19aa096d18e2e8772ea482392", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64655a7057f054839108c2d2cc9b8687a20a3d30303030303030303030303030300d19ea745ea0cd143f1a3c7a31e41e933030303130303030302cdb941400574d91a74edec76a57b76918177fa0aad43ebbebf522f39540dfed8072492f257f73d8925d13b678916b5e1865457da17a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x101800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='wlan0\x00', r2}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="310000000400000000000000000020000200000000000000000000000000000009c9d55300002bfb2b6d1ff651ccdc8df0490000"], 0x31) [ 426.546245] kvm: pic: non byte read [ 426.565669] kvm [21440]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 21:31:17 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x147}], 0x1, 0x0) 21:31:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x148}], 0x1, 0x0) [ 427.508404] device bridge_slave_1 left promiscuous mode [ 427.513928] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.564678] device bridge_slave_0 left promiscuous mode [ 427.570220] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.751963] device hsr_slave_1 left promiscuous mode [ 427.770202] device hsr_slave_0 left promiscuous mode [ 427.789195] team0 (unregistering): Port device team_slave_1 removed [ 427.810773] team0 (unregistering): Port device team_slave_0 removed [ 427.847106] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 427.887619] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 428.029444] bond0 (unregistering): Released all slaves [ 429.379773] IPVS: ftp: loaded support on port[0] = 21 [ 429.520533] chnl_net:caif_netlink_parms(): no params data found [ 429.558186] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.565563] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.572876] device bridge_slave_0 entered promiscuous mode [ 429.580573] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.587115] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.594646] device bridge_slave_1 entered promiscuous mode [ 429.615867] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 429.625695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 429.652345] team0: Port device team_slave_0 added [ 429.659036] team0: Port device team_slave_1 added [ 429.680488] device hsr_slave_0 entered promiscuous mode [ 429.686499] device hsr_slave_1 entered promiscuous mode [ 429.704171] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.710625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.717371] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.723756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.770183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 429.783301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 429.792776] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.800582] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.808925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 429.821876] 8021q: adding VLAN 0 to HW filter on device team0 [ 429.834173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 429.844009] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.850436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.875950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 429.883713] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.890151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.899708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 429.908160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 429.923751] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 429.933889] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 429.946734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 429.953928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 429.962387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 429.987501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 429.994797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:31:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00`\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffff7fffffffb) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x406) semctl$IPC_INFO(r3, 0x3, 0x3, &(0x7f0000000180)=""/134) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x945944c046355621) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1d2b) 21:31:21 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r1, 0x80000) 21:31:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000004c0)={@remote, @multicast2}, &(0x7f0000000500)=0x8) ioctl$KVM_SET_PIT2(r3, 0x8010aebb, 0x0) 21:31:21 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0xa, &(0x7f00000017c0)=[{&(0x7f0000000200)="69a3775336ecf32651ea7a152c47dcd97b39bf0dabd7d42e867a8b2b7886be3b6db08a459f0650eb00d44053c5f3d1254596232465a637398fc9fb34fa1a296027a15e573df5c6a009fa5eea885e17ad826f61a1eeca191c4bbc78afb5f5ec324939dae06b761a8f01a0e5c5", 0x6c, 0x6}, {&(0x7f0000000300)="85e52f52edbc6831739eee56afa7252929e091258c2e28541860cf01551f7f3c8eb7e8784ace979682bb3a2b1ef8bdcccea9b27f21d0ce0d71ca8f6074a232d5ffd26b86ac9ac1bbd63cc2221a303062c27825c213746dd18feb030a7463c38b7c97d6f408d58bf02d1d1c2e5eaaa0fcb00a2f6a7ac2510f709883feef2b6c7bdb7e629c23aeeb59c54b8dcfc070272de7", 0x91, 0xfffffffffffffffb}, {&(0x7f00000003c0)="ff80fe1ca805af82ce37ca92a08ecb32a0ec68b58d081a10f594f5162ac158a5592e9fe5b54f5d3987af3b2cffb53b16f53b6a77715b217e3d26b712d9d9ab93e8eb126c501ef4ab702c72080dcfa73ef7901f725ca421dfb077f0c00bbea2f6970b", 0x62, 0x3}, {&(0x7f0000000440)="acea6e99d1a3fe29afe47759cad64a31fbdb4ee1785541cd9063704906ffb15b829d6071a32f8586ab167708c2988e0ff356321bba4481852d346f0447c0252fcd21fd47fd32d6cd639beb4bc0f2174c1ade7fb4b2a780041e7e8725098bb7db6db52986387d23f6fbbec59361e128a6bd75fcc400169874652daa4468c8870f86ad7536173c80905d98153efa17a6252b74b01c0352337c3d96d763782ef14798e3b9aa9a920811d544", 0xaa, 0xfff}, {&(0x7f0000000500)="56a4fb64c84c79a69c2ff611fcf3591b936e8d2c6e02b2d64ee090ba1dc690815f52a767ec2fbcd75453601294e33ea4f8dca393f146587c10c8712b976353c4f287e5d386d46a9bac1cb2cdb785a5773a97ea1a7d5547ba5f4c05c09efb98eb43da25", 0x63, 0x8a5}, {&(0x7f0000000580)="68346a18ddac4f5bf7f08b11a85d3ca62122a75ad08db8e39e5898e66a638758280fa1ef936afa76715f7da9de282c9b495c239d2cc23c3686f7aa2add45d7479e089be8e625466f5bce25ac4e336b4901f9e352db50def3f851dd45d0ef99101e0843945b83d1d29f842567113671398ea87e4443880710f1d23a4814faea11abd70e72d7d98ef69f57c607c53aa6170aab57277b2a7d0c1c4aa80d766fb9b4e9360dee47d21980f7ab244698df0041676d1b6da3df25b06df1dd43cabb0e1cbae93e6db817f2f5bcf02cff813ad16f65fd3234013ea313f0620182c04a3f6262f5f352beb985c0ee89f7a3c62ca761ad", 0xf1, 0x3}, {&(0x7f0000000680)="1c3bfc0abd858d70da2897a07ef11ba55c7245852ffb2c63a97b0e44c371953b6e6341aa0654cd69182a3076020e85480310b53d084a13fe49e91b60918a0106c220223dca76d3d8", 0x48, 0xb6}, {&(0x7f0000000700)="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", 0x1000, 0x9}, {&(0x7f0000001700)="44746b46e90e08e02e60c7f17dad144bc2a311f9daa09b4dd791bdd701359d5b7b0bc9725aa9b7ad223afc8c0d6f22f2d371561b710ebb4c4448e29d30c5c92b12a3a6106980ba848dbf3db6ff112716689d1da5335cc91d523840169e560b7751171ff85b2eaad357a34e9697", 0x6d, 0x7ff}, {&(0x7f0000001780)="f4279474355f78cb667b3077cbc551148396ba690d179548859b3ef4ac4cd9128c4004", 0x23, 0x6}], 0x800, &(0x7f00000018c0)={[{@subvolid={'subvolid', 0x3d, 0x8}}, {@nobarrier='nobarrier'}], [{@appraise_type='appraise_type=imasig'}, {@dont_appraise='dont_appraise'}, {@measure='measure'}, {@obj_user={'obj_user', 0x3d, 'user_id'}}, {@subj_type={'subj_type', 0x3d, '/dev/fuse\x00'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}]}) fanotify_mark(r0, 0x0, 0x1, r0, &(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:21 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x150}], 0x1, 0x0) [ 430.041388] kernel msg: ebtables bug: please report to author: bad policy 21:31:21 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x153}], 0x1, 0x0) 21:31:21 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x33a, 0x800) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r3, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe60}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9c}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x633}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x44840}, 0x8000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 430.155839] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 430.174321] net_ratelimit: 18 callbacks suppressed [ 430.174330] protocol 88fb is buggy, dev hsr_slave_0 [ 430.184460] protocol 88fb is buggy, dev hsr_slave_1 21:31:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x03\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 430.241674] kernel msg: ebtables bug: please report to author: bad policy 21:31:21 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0x9, 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 430.291181] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 430.300740] protocol 88fb is buggy, dev hsr_slave_0 [ 430.300796] protocol 88fb is buggy, dev hsr_slave_1 21:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x200000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0xa200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 430.364367] protocol 88fb is buggy, dev hsr_slave_0 [ 430.369494] protocol 88fb is buggy, dev hsr_slave_1 [ 430.394175] kernel msg: ebtables bug: please report to author: bad policy [ 430.404306] protocol 88fb is buggy, dev hsr_slave_0 [ 430.409393] protocol 88fb is buggy, dev hsr_slave_1 21:31:21 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x15c}], 0x1, 0x0) 21:31:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000004c0)={@remote, @multicast2}, &(0x7f0000000500)=0x8) ioctl$KVM_SET_PIT2(r3, 0x8010aebb, 0x0) [ 430.452397] kernel msg: ebtables bug: please report to author: bad policy 21:31:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x05\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:21 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = signalfd(r0, &(0x7f0000000000)={0xfffffffffffffffd}, 0x72cd186cffe5810d) fcntl$addseals(r1, 0x409, 0xb) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c06"]) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000240)={r3, 0x3}) inotify_init1(0x80000) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, 0x2, 0x76}) 21:31:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0x8001, 0x7}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$radio(&(0x7f00000004c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000500)={0x0, 0x2, 0x4, 0x7}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000580)={r4, 0x4}, &(0x7f00000005c0)=0x8) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x1, 0x482001) ioctl$RTC_ALM_READ(r5, 0x80247008, &(0x7f0000000480)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x8, 0x402000, "92e22d6cbe17908e7fcc565fab61af29c11796dd3626c220", {0x7f, 0xfffffffffffffe4e}, 0xfff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r5, 0x4038564f, &(0x7f0000000600)={{0x4, @addr=0x100000000}, 0x8, 0x6, 0xfa}) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000003c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000400)={r7}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x0, 0x0) connect$netrom(r8, &(0x7f0000000300)={{0x3, @bcast}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast]}, 0x48) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0xc400, 0x0) ioctl$KDSKBLED(r8, 0x4b65, 0x6) recvfrom$netrom(r9, &(0x7f00000001c0)=""/88, 0x58, 0x2100, &(0x7f0000000240)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @bcast, @null, @default, @default]}, 0x48) 21:31:21 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={r0, 0x0, 0x10d55c7d, 0x7700000000, 0x5}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e24, 0xa6, @local, 0xffffffffffff27b4}, @in6={0xa, 0x4e20, 0x1, @empty, 0x6}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e24, 0x4cf, @dev={0xfe, 0x80, [], 0x1c}, 0x7}, @in6={0xa, 0x4e21, 0x3, @rand_addr="4a44af70d916b38d133097b6e6cde053", 0xb7}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @remote}, 0x100000001}], 0xdc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000240)={0x5, 0x7}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000400)={0x1, 0x3, 0xc93d}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000440)=0x0) ioprio_get$pid(0x2, r2) [ 430.645900] kernel msg: ebtables bug: please report to author: bad policy [ 430.680888] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x06\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:22 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0200"]) umount2(&(0x7f0000000000)='./file0\x00', 0xd) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x480000, 0x40) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x42000) 21:31:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x15f}], 0x1, 0x0) [ 430.694316] protocol 88fb is buggy, dev hsr_slave_0 [ 430.699517] protocol 88fb is buggy, dev hsr_slave_1 21:31:22 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmote=0000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 430.759341] kvm_hv_set_msr: 4 callbacks suppressed [ 430.759357] kvm [21524]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 430.801627] kvm [21524]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 21:31:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\a\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 430.854729] kvm: pic: non byte read [ 430.868330] kvm: pic: non byte read [ 430.883032] kernel msg: ebtables bug: please report to author: bad policy [ 430.892982] kvm: pic: non byte read 21:31:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000004c0)={@remote, @multicast2}, &(0x7f0000000500)=0x8) ioctl$KVM_SET_PIT2(r3, 0x8010aebb, 0x0) 21:31:22 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69645c566bba3920cab7e5968298909b23bef1699cc62b73ca13529ff0a1bca6b969a10583bb8ae8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x168}], 0x1, 0x0) 21:31:22 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="9060f588f921b8a2e693bfb5296166643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0e8f6df6ede2c23e0bc18c2458ae1e84eb85864b4fb3043c8370c8adf0767b05e8e977c8f29277e4d2d480e85b9af8fddaba6b362564bc69aace9d4994dd67b045ea0ee8aced47250a04ec6622a3f034b00d7f6e1742f77f3a8e336868af7732bdd1f73f66a1e0c14f593aa47fc30c6c257a3db06a9d4eb954cc4ac313d26b24e7a4d7ad16000000000000000000000000000000"]) umount2(&(0x7f0000000140)='./file0\x00', 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000003c0)=""/177, 0xb1}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x4) [ 431.080164] kernel msg: ebtables bug: please report to author: bad policy 21:31:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00 \x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:22 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x21) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x6af2, 0x5}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000005c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f00000000c0)=0xfa) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 431.125389] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:22 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x1, 0x80) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x169}], 0x1, 0x0) [ 431.237086] kernel msg: ebtables bug: please report to author: bad policy 21:31:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000004c0)={@remote, @multicast2}, &(0x7f0000000500)=0x8) ioctl$KVM_SET_PIT2(r3, 0x8010aebb, 0x0) 21:31:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00?\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:22 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3d80"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 431.343759] kernel msg: ebtables bug: please report to author: bad policy [ 431.349504] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 21:31:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x172}], 0x1, 0x0) 21:31:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='veth1_to_team\x00', 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x103000, 0x0) ioctl$TIOCNXCL(r1, 0x540d) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f0000000180)='fdinfo/3\x00') r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='cdg\x00', 0x4) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x2) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c7a6f6f746d6f64653d3030303030303030ac6cb8cb8fc32ae5303130303030302c757365725f69653dd0a6957b7460d49aededdbf2710fbff128223b0e92321cc0e2965103e66b18eee6d39c84", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000040)='./file0\x00', 0x3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='vxcan1\x00'}) clock_getres(0x1, &(0x7f0000000240)) [ 431.434973] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 431.472420] kvm: pic: non byte read [ 431.503252] kvm: pic: non byte read [ 431.519415] kvm: pic: non byte read [ 431.535035] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 [ 431.538061] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:22 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.upper\x00', &(0x7f00000001c0)='vboxnet0em1\x00', 0xc, 0x1) [ 431.566600] kernel msg: ebtables bug: please report to author: bad policy [ 431.583238] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 21:31:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x175}], 0x1, 0x0) [ 431.607333] kernel msg: ebtables bug: please report to author: bad policy [ 431.629662] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 21:31:22 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32, @ANYRESDEC=r0], @ANYRES64=0x0]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 431.656746] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000000d data 0x0 [ 431.680938] kvm [21574]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 21:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000080)={0xfffffffffffffffb, {0x1, 0xfff, 0x3ff, 0x4, 0x9, 0x80}}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0xaaaaaaaaaaaab3f, 0x1000, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00`\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:23 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000180)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x176}], 0x1, 0x0) 21:31:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000004c0)={@remote, @multicast2}, &(0x7f0000000500)=0x8) 21:31:23 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="66643d6ad13ca305d4258002f6de0097b6218296f4578aa3b749cddc9a7366eaab24302546a8cc2f55f89903c0aaaf2a13ae49b7165508dad745c6350d35d698892a7c9849d5295fabced9a153b1051b134d8baeeac88aecdc7744881ee204ce34d59708953d66255bf69b00000000000000000000000000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040)={0x2, 0x8}, 0x2) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 431.931541] kernel msg: ebtables bug: please report to author: bad policy 21:31:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x01\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:23 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="26c4a0c7a98a51344b1c99", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x183}], 0x1, 0x0) 21:31:23 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x800000000000) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000b40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000340)=@ax25={{0x3, @netrom}, [@remote, @default, @bcast, @netrom, @netrom, @remote, @bcast, @rose]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/63, 0x3f}], 0x1, &(0x7f0000000400)=""/173, 0xad}, 0x9d}, {{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/127, 0x7f}, {&(0x7f00000005c0)=""/221, 0xdd}], 0x2, &(0x7f0000000700)=""/3, 0x3}, 0xfff}, {{&(0x7f0000000740)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000a40)=[{&(0x7f00000007c0)=""/81, 0x51}, {&(0x7f0000000840)=""/230, 0xe6}, {&(0x7f0000000940)=""/188, 0xbc}, {&(0x7f0000000a00)=""/40, 0x28}], 0x4}, 0x32fe}], 0x3, 0x40000000, &(0x7f0000000b80)={r1, r2+30000000}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6664b8", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000000)={0x4, [0xa0, 0x5, 0xcb6a, 0x2]}) umount2(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000bc0)={0x8, 0x1, 0x100}) [ 432.059588] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000180)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 432.120279] kernel msg: ebtables bug: please report to author: bad policy 21:31:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x02\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="96e68cae6a5977a7a0850602773e219c60b45c9227185a406925a78157b639ebb8abd9b1de339c3c1b308aaf599a1a39ac64b13e7e4966c6b211d91218a55bccb4425d9cea9de0a7a9e1cd59d1e4c99eeeee15229ae57964a9f178344639fb006ff9a1a57d8c68f7783999e2990d96b5daaa790d1e881d2ede8a87bee49b0a253821cc4917246becce3a015c9c43d04c595f1a6e868b2efb65a1bf79a84ac08a2b35139abc9fb6fb086025b933140bd1d54f98fd1b9dc4a41aaf64a6b4678e6f0c3744f9c9fc537347a365ca86d0530d0d02383bdfb1230f0a5ff68725628ffd6c16b419b40f6617a707290f11bcb4a289aa6b2905a457a012489b", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) 21:31:23 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=""/226, 0xe2) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:23 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x3) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000080)=0xff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18, 0x0, 0x8, {0x4}}, 0x18) syz_open_dev$audion(0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x201, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}]}}) creat(&(0x7f00000001c0)='./file0\x00', 0xf63fe99ff7e99d51) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 432.271377] kernel msg: ebtables bug: please report to author: bad policy 21:31:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x184}], 0x1, 0x0) 21:31:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x03\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x2, 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r4 = accept4$rose(r3, &(0x7f00000002c0)=@full={0xb, @dev, @null, 0x0, [@netrom, @bcast, @remote, @rose, @bcast, @netrom]}, &(0x7f0000000080)=0x40, 0x800) timerfd_settime(r1, 0x1, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000180), &(0x7f00000001c0)=0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x400000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:23 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x5) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00A', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6c67726f75705f88643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0xe) [ 432.425730] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 432.428580] Option 'D' to dns_resolver key: bad/missing value 21:31:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x04\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x185}], 0x1, 0x0) [ 432.481526] kernel msg: ebtables bug: please report to author: bad policy 21:31:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="96e68cae6a5977a7a0850602773e219c60b45c9227185a406925a78157b639ebb8abd9b1de339c3c1b308aaf599a1a39ac64b13e7e4966c6b211d91218a55bccb4425d9cea9de0a7a9e1cd59d1e4c99eeeee15229ae57964a9f178344639fb006ff9a1a57d8c68f7783999e2990d96b5daaa790d1e881d2ede8a87bee49b0a253821cc4917246becce3a015c9c43d04c595f1a6e868b2efb65a1bf79a84ac08a2b35139abc9fb6fb086025b933140bd1d54f98fd1b9dc4a41aaf64a6b4678e6f0c3744f9c9fc537347a365ca86d0530d0d02383bdfb1230f0a5ff68725628ffd6c16b419b40f6617a707290f11bcb4a289aa6b2905a457a012489b", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 21:31:23 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x3e) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 432.638366] kvm [21678]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 432.672086] kvm: pic: non byte read 21:31:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x189}], 0x1, 0x0) [ 432.682179] kernel msg: ebtables bug: please report to author: bad policy [ 432.690963] kvm: pic: non byte read [ 432.701726] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 432.712676] kvm: pic: non byte read [ 432.717887] kernel msg: ebtables bug: please report to author: bad policy 21:31:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x05\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 432.906265] kernel msg: ebtables bug: please report to author: bad policy 21:31:24 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0xe0b, 0x9, &(0x7f0000002540)=[{&(0x7f0000000200)="a8cb9c8335332ebfa3c25dced6d2ce4f8cc6aa41340bebb124572e0f38b0131dc8c501cd5b52c2b9187b43836545b261c05ba904cf674bb5f4a50eb9ad102e82b3870a8119498eeb0d4f09d358fd3e24649a8a5abefd873bbe842b3a49f6b3a59e", 0x61, 0xc58}, {&(0x7f0000000300)="199966cc69932337f1b52247d42ef5318e3ee6c51a783e6190ab946388daf97688d7121b79954161d515dd17ed5423d78fc4c74571fd3279087cad40dd2ea61b66c7dfb3b623a56fa08d21420be26f2e81e7bbb342c8ffe6540450a210c6b52ea97db862b37e2917833570702e68806acee0538e54", 0x75, 0x9}, {&(0x7f0000000380), 0x0, 0x6}, {&(0x7f00000003c0)="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", 0x1000, 0x6}, {&(0x7f00000013c0)="a222b09486795f1a23f0c1be2fe18eaebf862ad7746fa69d89e6f0f2a55fc0d710a94db36baa3d6b7024a4ed5acef8627303469920659df3d2213a15b1b3eceee12d78d90929b524155ff0d9ae5300ff855821b7f83def67b9d5a2e96769e4daa17ee9912b0ac4a9291f161a7041cc7fd740b1a17c87d7fcf3cfb6b8d00f2c33ab13", 0x82, 0x10001}, {&(0x7f0000001480)="62c9dc", 0x3, 0xffff}, {&(0x7f00000014c0)="683863ab2736105ff370c0", 0xb, 0x6}, {&(0x7f0000001500)="18d1b4c893c313654bb7978018520fc210e9160cddac1a56bc8332077bc064826f7f65dc1a5d62b9276b3bde1cf6b2c820b9baa07e593a20bbd7caee6fae0abba258f94c5a02d305543967a90e9ef57c48740c4f873a8ede63c78763291856e399412050e708de11f65ec3bfdbf918dc9d8437441e2dfdf2abb8d446264318d3f739904592e6f1982e24406b98872e78a2f695795e488ccfead5573c523d10be6b28e97e2c96aea2c4d4fcb4ac8e4db00d15467cc0016356abc613839f03a43481455b75354957d15048182e7a1367812b8da9822a8f4e08609ecbc8d6eae8cfe0322385c4766db05eea39e967fa5f99afac1dac4c263be06d979de2d097837d19f0d764f4d6edbba237d8805e86772d20757e03fe2e2e249aef47df4936350c29e292472543cbf6a7b3f71cbaaeebf48ffe54d8e6bdbd45c6855c672258aa06ce48e34a3730674df380366bb3c9fa25956407d5a618a1e9ae5f4ffadde23b81896b47f24726d40240826e4e4c542e707918fc32cb96372c0b182972863bd150a6f67bb28db658a33da1f604aaa5e6a462e664c8fa6dbe3febaee7d03a5691e743c743f2626fcb255db6cc123280fedf9693fecbbbaf39d152585b7614c6b13d72cb44270a6fc0ea81823b832a3c8d8a2474eaba350d59011e04b3c36be6838c2618e7777b8d03514ffabf3066cabd0a09f6e3d671b3589a2937f4629f8b0fbe8a895b71ac4cab9402258fdbd13851591f02584148cf776ca43462e34408af97443be6bfcf7e066fd53c6bcfb7462904c2e1b3a27459efdeb10e4f4032f9f6edf8f2c830a5b025db3c718485738b900db2f57ff4a92aa1275f668ec335a2b813f64a2c9a98ba7eeda046df674deda54c6b9f78249e617c91867389ea0fb0d79defdef5178f2e505f9846f746693904f2096097f90cc7d7147a079066b2b46089fc5c32becace7313785358f66f30d2d95b5016cb2df04d2eece41af62b88639720b6e4e5d399c02f2f1617366f2da34fc1aa10635507616ca355c961c7421084c4b4b97da127a688255e6f4c4a9a5e2683bb9245c0075cee26a636126e76882932f275106d20551c6f26eca0f1ed3c1dd3d0061b7210a3565b15a92ede756cd29e7a778e8aa0a0c8b4bc63ddf6ac89db24edbe104f1e86670ea00441b9a0150a36e5677818e1094ec8eaf8b63a9293a699159e1556e0919372da53551df608a9fe8a5974cb97e6445e38e6ec49add0d889754d2bc9c7df18dce725299e82f9cf2efde79e68695823447d8f4399faa5679c44b6dbd44d7317e4f5ae1a9e133fd23aedabce2a7315cb94b173432faddaf6ee0331d9d76cb72172c84d35d9aab25b44a3425ef101f38eb15b32664a5af9dcb01ce8b07c0bc6cb4859889e71417d49463d5d9d1aadaa9e0e9a5a7306ade7726a287cb3eb606691370d2fa9a2db81a2eec6aef5b48b2cbaa4f3b968926c551ebd30be30bfa7f1a874ca9c0167a22baee918f8108a32fb24d99698d46b6b0090468935ad9be4a1bfcc687fcfc37a39aff40c65399e5370d661cdd16a0b77aa1e001abcd82c717b3286bd4d984249511e30f4864b62027593b902b5258d6e4f28ac56cba24442038a79c11b2bf4f84414146f351da9cf36b45448b6dd6fc887bbb0e29f5bf75847093293bdc23d90e79d5964755c8bfa28b089697b21a62e20f2c8bae254f9cb9b75322274a8e6e7c1d0401a9eca945559586752309a227ef61dfbbdc8e1c06d937a023a45411722f7e9bba53478dfcd6b5e12409ff1d7763387aade366965f1c125a69e000d286737e4cf9de647815e73dee58f039ed974b5ddf20592dce602ba199ebfe9e4f1f50476d5a11692ca80d621be8c000c2e0af2ec59f97b4d18ec9f9e7aa2f85f177bf0c4440006d6d4416cc61d3bb4ca6a21a1bc6b86512640fa41977d98df40e193a1dc11752b2af9828dea59735e3e857e6624ef3610f85c0558d1a96330949bf940eda323e45642e40bb847dd9e12d87ed36902d280843b303644555989707d84d2bda1185bb83c00a610f42a4af755d13681b3f77acb3d1d8d9b8bddbe9817afd81e7d222fadebdf10faad190fbd56b7c04b468d466792736d36408d7bce1d1b4d251be25b304a1891d7f7927dde3cbd89942d728008c552e54f53c05b3d0517486e7455ac60dd7abd56d61ae230bb025d25e80176beb33980e6a632c4dc498bcffa81356383ded9906b74d126343eead2b492bd51929d904b1f7a472a724dab54382ab69795fbc38bad39d415ff0dfeee5bedc1b3f2363ad3a4d34de456a5ecc48f831a7b06b16db4e68a360071ad37b25e0dcfa5ebd1eb2a02b5f574c5e1b02d4f3de8479b2b5729316741379c009b8a8777d9d0803ae3a3d720c7ac628d112ec775680b1fd7ab06981227c495e827a3d3d85df18729b8332dcd42c38c41a6ef67763a43dccdb2b0479d40024c0667d7857548c473f0ef6a8abbc94404b69bccd5ba7babf037c827c27ef66aea97a4d6fe08bb3d52899222c36bb555bb6e245be2f9a2ce0c02ed036eb9cee1016c250a112957a9a62c78efef794ac3c9187dd39e4086cc0a130c91e839d6cde75a40a8cbb7491623f1715392a6b9133d5636d48d5ac736305f08ee5e601a3902e88133fe16601ffc87bde8324c39e23d6645e2bef8d4083551aa19b833d6ebbecb5bcab79515f662086c8653a5741bf267b1ad87ff23616f6ba70ce98eb502a2d0d39d8649b8366087cbf6a3d460a14e17f060cf877db0a5c2a7aac113d59116842fcd994ec78e4c1918428430f167a5298904b4480387ea09b7a38da02b81480ba7cbde9e87339fe126845aaaced59d4647547ba85a9e0758fba8b1675adc1c828a05cea73bffe6206e0d7c1c0867e86f6a62781663747a532fa217eeb6acaa8ca5a60fda736e0b2990898e4b7866f9b045448733580495863c729d0888081980d8c8192c86ee5e7d8142d175b4a5ea02a865c3ad127a613b82494b25249850fbdfcb0100dacffb834458421ebb573e1931f0a853c3c0fc774513be4c2f699d40c46bcabf6f92bb6ed191c0eaf8b334499b554bedf899d43b99d8fa24cba859dd3966404551b5ff00b7c78731b9284f4e240cc73ce04e312313782f78e95faf4d054c4d903b70e6e0954b7d0ef82b370348bf50b3cacd40b9cefecdba316314dddbe81184eeee58d534b9588214f162f939f708c7e6225ef60b58eb9ce16ad539d0cecb5479dad9ebfcd3c97914bc6a2db1527a37b35ad792270620a3e09d5010123d3ad508ea9d32875c7059b142ed517c0d1d491d4f3cbedad726cf4ec56d6088cab9cff7cbf585f1c72e674d8dbeb54cae8294d7762527a543c1c8e09f3d8ed9a66d7feb6503f45e45b4007adf077457c2c4a4cee6d2e987b31211ffbcc464234219fffd6aec7566348d090ff8821a1362ab518c79a5c800b9ca97b7df0e74f1660c94031b8a458f2c7eb43809fe90b1c7c1077b821508ee1527a16abc10d1812223285cdcd6ef0c45c5695b27c6f430c445219970c191fa4d7e54fab6f692cdff5466a92cd6ac3f22a441d523cac68a63e735e65e5a00e21d480d84b7c13697bf40c1fd46aa29ecaf2c4c3d3082c699a05649051f9c8095bde79e0a2b4099fb4aa041c5ff74f0d5ab37110b86c7da14c7863e5df2f355d614fc9cdbfa4e951c5aaba47cbc3162423482f5a4eb0bb4b50373146efe23f02da32e89436a1048ba1b55be94be9794352160c930c90ea7f052bdd1f366b8339775346aac246cad1b669c3812da10637216ff8a77f86c09a9aa75710493f129e8043d161129795ae22c8e323feaf7260bd12f7e3da2e2b6dab5141f0f65570d8eda51a24c8805de5bb2c79bd777065a613133e3f9a9d542c12a76e7e859531b03ca91f4d3f8688a5ffb83b4b355df9222ba3877072fff92e718ec4cff7e6870843a4770e92f00042dcaa939ebe55e11c8694f0235d405e6435ffc20102f6abda21c2716aced7e8712e63091baebff32cb13ccdfca422e89594bfe6b0f05b843efa26668741f63a3c2264b752db5c7280e2e97118d3df4878c252191c7dbb23cbb2ed0645f7a25dc838158ecee47e91fc4f71c4346ae98c19b355208196c50bf9a55c5406780d921e52b27c5bb9098408f07cfe5ad9a75e8ba39afba874f99eb3b99e64d4fe559f4d3637a6d3df918e2f1166b8aa3cfdec60865c166a865119c6acd9a101e7a30bc5d4834ff841259b65243dbcb8154fc5ca120569682a9608e0d7342339fbd0ef985db297452d5ceba4f90d3a1ec55137bed0b4c0f2e581de04cec51f05715a4f1f8f4adf06889c3f89d02ee7f7ae8bfb1cbeed224bc00ee4d27f00bbabe46a68708678759fde61e76026785833e72e2ae4c5707c9027b7df9804a67c796c1d5fb88adb2a898e6b2f86594e33b8c3fe6ed07a95b32d387b6a946563c1cc84f748b47cde71fd871059febe77a0e94e141be7cdacb5d0c8bc77fddab95276e8648930b3c7717078e5c266bd266d1c62f5aede96c6984b8afe66e558ca4aae0fb30924366de2c76b8b2db1fbd8e8b395b9a0ef84677e86c60ea468520a0aff5b31898e15e24552440f946beca96cad92d22200e1a1927653d45f12b87ad88f0ed0118c23e586971930dd3a50dfdba2c0cc6b7a3fb4c2e0843ffb7be8da6e5ca66b0f5a87b3d8cfa257e29b27c6b8f923acc7ea70c13bc56bf9652d2eea53b077fc71b64938aa99bc35b4f7e5bd30464938968b17f4f70b250012141945b587ba6fd42a9cf0cbb1fe20e9fb4b9c16ff69553bc1475fab12600563732ad04cd6b8c4314b8b0e3461731997f13955871f1ce35b8eb43edf74e432fa7bb13fe26fc126953a5ad6c85490bbe9292aa8b60699c0fa1df0aa7861dc0d14cc8d13adbf029d21c1434e1973a80d7f49dec9e32e8d482bdb764f7a50729f56d0af021ee055e371e8f513366305680ae3da163e65e8d74b3ce34673dc175ff949b840bfe4bb34e084b36e0d4b8fe7ed5f9fb6c5b2266d5bc5172f8dfb80a7e486c8b5a4d9f85019a1a1e6889272126f1ce2a1849b4a82cb95b69e1e6f10bc2e9f64c8c8909c3f729c6dc0c98cfb075e995adba268f04db693bbb2a0c53fc5268c2c08f73c2728d0e43dbf4a146810b51b2153548ad8e22ea4df6df3a133cc25a8c06aa19859a874bb0c165633beaf8f33a212c7eb62a3e0e028bd4a047057ec06f1e4f16b897553e1f729ceadd6cb9310f40963c99dec0b5abad766e00c7053eddfa7121213e98984f91b23f6dd0b837e0ac0dc61ad717d9c66f66b51ef12a1d4bd90966815d60c98a9f84d0170cc8e05584ffb5d0461db3f85aaf3ff2f7d55e5ad3c9d16ca62080ef454c6fcb1e9b6b660255d12da6a13774b5bb98849e6dd3629da64d5653f819222f9e6f986ae59e05fb1694a83994fae09106d5ea1167ab116ed90dfdcd410e177fbf0627eb5281b38d1766b62be40644e00472d515a1a1714336ab14911c9ea793249b9f60cff776c07abb80892931098f0afde54538c9de58faffae5d84ca668b82da60926674d6f7953d5351192f58c47ebb22d23ccbe2df5c33fd7e46a2a28c357064a255fd1b4223b3aa410007be6ee34f3bdf8efbc66b9912e396206a85b86895510e66b9f79e6968b774fbac0d4a42d940c307ebe4e47a78535eebd089aab57ee7b8703db3a44bfa34b7154b0d7796d21346b484f453abfcc83a9ac26064dff94bb08a6808e533326e7c48ff8a97cc692f9d6a643ca1de46fbffc3b56c564cf6185c930abf00cf8f21d910b07d19d5", 0x1000, 0x3}, {&(0x7f0000002500), 0x0, 0xffffffff80000000}], 0x800, &(0x7f0000002640)={[{@balloc_border='block-allocator=border'}, {@usrjquota='usrjquota'}, {@tails_small='tails=small'}, {@resize={'resize', 0x3d, 0x202000000000000}}, {@notail='notail'}, {@jdev={'jdev', 0x3d, './file0'}}, {@usrjquota_file='usrjquota=syz'}, {@usrquota='usrquota'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_notest4='block-allocator=notest4'}], [{@measure='measure'}, {@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp1\xdd-\x1auser'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@subj_role={'subj_role', 0x3d, '/dev/fuse\x00'}}, {@subj_type={'subj_type', 0x3d, 'vmnet0vmnet0ppp1[md5sum'}}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='md=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x18c}], 0x1, 0x0) 21:31:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:24 executing program 4: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x84, 0x7fff, 0x7f3, 0x0, 0x6}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r1, 0x44, "678f61d09838b8d536834b48098a7e4a0917015eb69d74f6d7ea6ffdcecec4677aa5fe2c464b1808c1ac9fd5ce151cfe21319f5dfd431b8103d59c9b061a3ca67235ce54"}, &(0x7f0000000240)=0x4c) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1d) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000002c0)=""/150) 21:31:24 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) 21:31:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x06\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 433.281276] kernel msg: ebtables bug: please report to author: bad policy 21:31:24 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x401, 0x40) 21:31:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x193}], 0x1, 0x0) [ 433.338396] kernel msg: ebtables bug: please report to author: bad policy [ 433.340593] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 433.346166] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "usrjquota" requires an argument [ 433.346166] [ 433.368301] kvm: pic: non byte read 21:31:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\a\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:24 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00 \x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 433.571886] kernel msg: ebtables bug: please report to author: bad policy [ 433.597308] kernel msg: ebtables bug: please report to author: bad policy 21:31:24 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) geteuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='fuse\x00', 0x3, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x800) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r4, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x70}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1000}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$KVM_RUN(r2, 0xae80, 0x0) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000005000/0x4000)=nil) 21:31:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x19a}], 0x1, 0x0) [ 433.634710] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) [ 433.744701] kernel msg: ebtables bug: please report to author: bad policy 21:31:25 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000038030000a001000000000000a0010000a0010000a0010000a0020000a0020000a0020000a0020000a002000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ac1414bbffffffffe7abc07fffffff00726f73653000000000000000000000006c6f0000000000000000000000000000000000000000000000000000ff0000000000000000000007000000000000000000000000000000000000ff0000000000000000000000000000000200030000000000000000000000000000009800c00000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020200360e0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b800e0000000000000000000000000000000000000000000000000002000736f636b6574000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000800000000000000ac1414aaffffffff000000000000000073797a6b616c6c6572300000000000006970365f767469300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000001d0002100000000000000000000000000000d800000100000000000000000000000000000000000000000000000040007365740000000000000000000000000000000000000000000000000000001f00000001010000070000000100000003000000000000001f00000002ff0000280052454a4543540000000000000000000000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x398) r2 = geteuid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 433.806509] kernel msg: ebtables bug: please report to author: bad policy 21:31:25 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000300)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r2, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) connect$unix(r0, &(0x7f0000001300)=@file={0x1, './file0\x00'}, 0x6e) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000200)='rootmode') 21:31:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1a3}], 0x1, 0x0) 21:31:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00?\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001ac0)={"55c990a24964e82a3ec457f4c7010081319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b103f296fa7dc9af116fbe220121fe139739226eefce468f27f5851ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fde984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 433.961571] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:25 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="660101", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="c937ceedb0f56f0a030e990b788e0000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 434.048366] kernel msg: ebtables bug: please report to author: bad policy 21:31:25 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:25 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) fsetxattr(r0, &(0x7f0000000040)=@random={'system.', '/dev/fuse\x00'}, &(0x7f0000000180)='\x00', 0x1, 0x0) 21:31:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1a6}], 0x1, 0x0) [ 434.127017] kernel msg: ebtables bug: please report to author: bad policy 21:31:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00`\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0x9, 0x101}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1ab}], 0x1, 0x0) 21:31:25 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030103030305b40bfe53030313030303030d441a471a67863122c547365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2d005e3673317126a6803f0742a1ae667146e33961b67e2f0c6af2ac80e1d1d737ca94d7a12c007c11178919974d7afc6b7c10fe1241db1c3ee94284daa7d81b54e657a9c60d4ec4c22e39979fc93a592d8a8170c732543fd5cb16ee2a4ea71efd8369f0f815fe942c9c59d2491f7dfe3dc661239264289005e09c0ee9f2cbf0c83ba12170c0bef314b729e7b1484310cf3cf46f18f68810681f2b61b447e7314215b3559d7dcd4d885f8c5c4d04fb8dc3881427b696e812fccc24ab349fad0d92a5de3033cf3c5178da45ba3101a6e56031f3d9df89705f8c1a7f9c60d85eaf1e5833b709a572b9b10f64a3"]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000003c0)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x80000001, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, r1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:25 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 21:31:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x02\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 434.312129] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 434.324578] kernel msg: ebtables bug: please report to author: bad policy 21:31:25 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="96e68cae6a5977a7a0850602773e219c60b45c9227185a406925a78157b639ebb8abd9b1de339c3c1b308aaf599a1a39ac64b13e7e4966c6b211d91218a55bccb4425d9cea9de0a7a9e1cd59d1e4c99eeeee15229ae57964a9f178344639fb006ff9a1a57d8c68f7783999e2990d96b5daaa790d1e881d2ede8a87bee49b0a253821cc4917246becce3a015c9c43d04c595f1a6e868b2efb65a1bf79a84ac08a2b35139abc9fb6fb086025b933140bd1d54f98fd1b9dc4a41aaf64a6b4678e6f0c3744f9c9fc537347a365ca86d0530d0d02383bdfb1230f0a5ff68725628ffd6c16b419b40f6617a707290f11bcb4a289aa6b2905a457a012489b", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:25 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) sendto(r0, &(0x7f0000000040)="8bc1bb5709e36334da52f32358802d832fc39c0802cdb112e6d4fd3367e66380208ba5f4fdd2f4b45df49f99b969d1", 0x2f, 0x20008004, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x3, 0x4, 0x1, {0xa, 0x4e21, 0x7fff, @rand_addr="18cc8d7370042b04bcc9069e12fef92b", 0x5}}}, 0x80) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 434.500213] kernel msg: ebtables bug: please report to author: bad policy 21:31:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1ac}], 0x1, 0x0) [ 434.574749] kernel msg: ebtables bug: please report to author: bad policy [ 434.627259] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:26 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4400, 0x0) timer_create(0x7, &(0x7f0000000200)={0x0, 0x2, 0x2, @thr={&(0x7f0000000180)="3cbaa33ebb", &(0x7f00000001c0)="6c5826758a9549a26bf3df55bdfd797dcd3a9a690bd27e3727567b3a966b91da15193b65a9f12140d867dc9e95d67567b4"}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x1, &(0x7f0000000300)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000340)) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r2, 0x42a, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}, @FOU_ATTR_AF={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) 21:31:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x1) utimensat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{}, {0x0, 0x7530}}, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x20000, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000180)="400f1bb324d8033366baf80cb85149bc82ef66bafc0cec420f01f8400f380420f30f08260f01cbc461cde016b91c0a00000f32c4c2893ee7c4237d058a0000000000", 0x42}], 0x1, 0x44, &(0x7f0000000200)=[@cr0={0x0, 0x20040005}], 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) sendto(r3, &(0x7f0000000ec0)="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", 0x1000, 0x800, &(0x7f0000000300)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x4, 0x80000001, "dea960b5261f8b97f6647c9888233c70ed76d7db7b029ba42fa572e9cc2fe020c27349c5d8a874cff51c8d55812f0675400a1abcca42e05d5c95cca9664243", 0x1e}, 0x80) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:31:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x03\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:26 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:26 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1b1}], 0x1, 0x0) [ 434.846368] kernel msg: ebtables bug: please report to author: bad policy 21:31:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x04\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 434.990858] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 435.038163] kernel msg: ebtables bug: please report to author: bad policy [ 435.059821] kernel msg: ebtables bug: please report to author: bad policy 21:31:26 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1b4}], 0x1, 0x0) 21:31:26 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x6, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6f726f378138f7643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = getpgid(0x0) fcntl$setown(r1, 0x8, r2) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0/file0\x00'}, 0x6e) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x05\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2080, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000180)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x400, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xd1}}, {@max_read={'max_read', 0x3d, 0xdfdc}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@uid_gt={'uid>', r1}}, {@hash='hash'}, {@context={'context', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'bdevnodev\\\'eth0cpuset#vboxnet0eth1vboxnet1$'}}]}}) 21:31:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x06\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 435.417838] kernel msg: ebtables bug: please report to author: bad policy [ 435.445861] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:26 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1c1}], 0x1, 0x0) 21:31:26 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0xa3, @ipv4={[], [], @local}, 0x200}, 0x1c) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 435.484321] net_ratelimit: 26 callbacks suppressed [ 435.484329] protocol 88fb is buggy, dev hsr_slave_0 [ 435.494460] protocol 88fb is buggy, dev hsr_slave_1 21:31:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x102) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="414341adb6949e932a0dbbe5ea0bb1923c4e34fce1a36aaaf329709f98fc9c9e0d39b49675559711841fc53dc7f6242d346f183ffd939b9157e28082f6f77e19766f44c31822", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030316df44b0000000000000000003ad2d2bf000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x4, 0xff, 0x5, 0x4, 0xfffffffffffffffb, 0x100000000, 0x5, {0x0, @in6={{0xa, 0x9, 0x4, @ipv4={[], [], @local}}}, 0xfffffffffffffc01, 0xffffffffffffffff, 0x1, 0xdcd, 0x1ff}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e21, 0x2, @loopback, 0x3b36}}, 0x80, 0x5, 0x6, 0x7, 0xa8}, &(0x7f0000000240)=0xffffff69) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/108) [ 435.617687] kernel msg: ebtables bug: please report to author: bad policy 21:31:27 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0041aec8b714f26254b7ed85d309dc378d27ea66f98006b85f19ba80226ca3bdc3a67dbd885cff9da8a338e72d8042d4d0b2258114424e0376122bc95aa60fd72c07efa96317a939d5f500000000000000"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:27 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1df}], 0x1, 0x0) [ 435.714000] kernel msg: ebtables bug: please report to author: bad policy [ 435.746228] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:27 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000200)='./file0\x00', r2, r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000400)='./file0\x00') getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000180), &(0x7f0000000040)=0x60) 21:31:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000180)={"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"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\a\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:27 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:27 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1e8}], 0x1, 0x0) 21:31:27 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:27 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0xfaf0, 0x10000, 0x9, 0x0, 0x5, 0x5, 0xc99, 0x6, 0x9, 0x81, 0xffffffffffffffd6, 0x300e, 0x0, 0x0, 0x262a2a92, 0x766c, 0x401, 0x7, 0x3}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000040)='./file0\x00', 0x8) [ 436.028532] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 436.039609] kvm_hv_set_msr: 34 callbacks suppressed [ 436.039628] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 436.063899] kernel msg: ebtables bug: please report to author: bad policy 21:31:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00`\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:27 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1f5}], 0x1, 0x0) [ 436.086095] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 436.104935] picdev_read: 11 callbacks suppressed [ 436.104940] kvm: pic: non byte read [ 436.124840] kvm: pic: non byte read 21:31:27 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="96e68cae6a5977a7a0850602773e219c60b45c9227185a406925a78157b639ebb8abd9b1de339c3c1b308aaf599a1a39ac64b13e7e4966c6b211d91218a55bccb4425d9cea9de0a7a9e1cd59d1e4c99eeeee15229ae57964a9f178344639fb006ff9a1a57d8c68f7783999e2990d96b5daaa790d1e881d2ede8a87bee49b0a253821cc4917246becce3a015c9c43d04c595f1a6e868b2efb65a1bf79a84ac08a2b35139abc9fb6fb086025b933140bd1d54f98fd1b9dc4a41aaf64a6b4678e6f0c3744f9c9fc537347a365ca86d0530d0d02383bdfb1230f0a5ff68725628ffd6c16b419b40f6617a707290f11bcb4a289aa6b2905a457a012489b", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) [ 436.134597] kvm: pic: non byte read [ 436.154647] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 21:31:27 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='lgroup_id=', @ANYRESDEC=0x0, @ANYBLOB="2c05"]) getdents(r0, &(0x7f0000000180)=""/162, 0xa2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000040)=0xef) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000300)={r2, @in={{0x2, 0x4e20, @rand_addr=0x7}}, 0x2, 0x3ff, 0x6, 0x3, 0xfff}, &(0x7f00000003c0)=0x98) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 436.194159] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 436.204311] protocol 88fb is buggy, dev hsr_slave_0 [ 436.209498] protocol 88fb is buggy, dev hsr_slave_1 [ 436.244406] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 436.262515] kernel msg: ebtables bug: please report to author: bad policy [ 436.274597] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000000d data 0x0 21:31:27 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) 21:31:27 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1fe}], 0x1, 0x0) [ 436.299344] kernel msg: ebtables bug: please report to author: bad policy [ 436.315532] kvm [21918]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 [ 436.343882] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) r3 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000200)={[], 0x3, 0x7, 0x21a, 0xd0, 0x3f, r3}) r4 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000180), 0x4) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100001) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 21:31:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x03\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:27 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000040)=0x6, 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 21:31:27 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="96e68cae6a5977a7a0850602773e219c60b45c9227185a406925a78157b639ebb8abd9b1de339c3c1b308aaf599a1a39ac64b13e7e4966c6b211d91218a55bccb4425d9cea9de0a7a9e1cd59d1e4c99eeeee15229ae57964a9f178344639fb006ff9a1a57d8c68f7783999e2990d96b5daaa790d1e881d2ede8a87bee49b0a253821cc4917246becce3a015c9c43d04c595f1a6e868b2efb65a1bf79a84ac08a2b35139abc9fb6fb086025b933140bd1d54f98fd1b9dc4a41aaf64a6b4678e6f0c3744f9c9fc537347a365ca86d0530d0d02383bdfb1230f0a5ff68725628ffd6c16b419b40f6617a707290f11bcb4a289aa6b2905a457a012489b", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:27 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x8) [ 436.546191] kernel msg: ebtables bug: please report to author: bad policy [ 436.580659] kernel msg: ebtables bug: please report to author: bad policy 21:31:27 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x20c}], 0x1, 0x0) 21:31:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x05\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:27 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0xb08efa017fd960d0, r1, 0x8, 0x100018) [ 436.604319] protocol 88fb is buggy, dev hsr_slave_0 [ 436.609408] protocol 88fb is buggy, dev hsr_slave_1 [ 436.614534] protocol 88fb is buggy, dev hsr_slave_0 [ 436.619633] protocol 88fb is buggy, dev hsr_slave_1 [ 436.632534] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:28 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x1, 0x9}]}, 0xc, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000240)) umount2(&(0x7f0000000340)='./file0\x00', 0x2) fanotify_mark(r0, 0x0, 0x8, r0, &(0x7f0000000040)='./file0\x00') 21:31:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x20d}], 0x1, 0x0) 21:31:28 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) [ 436.789667] kernel msg: ebtables bug: please report to author: bad policy 21:31:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ec0)={"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"}) msync(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 436.840901] kernel msg: ebtables bug: please report to author: bad policy 21:31:28 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 436.924352] protocol 88fb is buggy, dev hsr_slave_0 [ 436.929460] protocol 88fb is buggy, dev hsr_slave_1 21:31:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x20e}], 0x1, 0x0) 21:31:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x06\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:28 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f3030303030303030303030303030f6e83f7e2224e3ae6e4b7a8777d6ca303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000040)={0x8001000, 0xffffffff, 0x1}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 436.974493] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:28 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) write$P9_RSTATFS(r0, &(0x7f0000000180)={0x43, 0x9, 0x2, {0xb7b, 0x7, 0x3, 0x7, 0x7, 0x653, 0x3, 0x5, 0x1}}, 0x43) 21:31:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x217}], 0x1, 0x0) [ 437.160179] kernel msg: ebtables bug: please report to author: bad policy 21:31:28 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "1617b1927d69d04036ddff1b50dda5be2c086a76"}, 0x15, 0x1) [ 437.202360] kernel msg: ebtables bug: please report to author: bad policy 21:31:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000240)={0x0, 0x0, @pic={0x1f, 0x7, 0x8, 0x7, 0x1000, 0x6, 0xe74d765, 0xffffffffffffffc0, 0x8, 0x1, 0x3ff, 0xffffffff, 0x9, 0x3, 0x4, 0x7fffffff}}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x60, "1f1087e1536431a2243509b7f65c73f38fe934c1168703725a50d7681639f1da3b59db1e439684b21a8513057b443794657f528dd9e46c3cdf60993304b6007b0380a8e494e9f0f9c3e45ed3120735f75859705a3457e6ac1feae125c1a6afad"}, &(0x7f0000000080)=0x68) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x7, 0x0, [0x4, 0x5, 0x3]}, 0x74ff) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:31:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\a\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 437.323598] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:28 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 21:31:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x21a}], 0x1, 0x0) 21:31:28 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f0000000740)=0x5b, 0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2fa1da9cf38a8cc5c2d0", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='fuse\x00', &(0x7f0000000200)='*\xc9\x00', &(0x7f0000000240)='fuse\x00', &(0x7f0000000300)='fuse\x00', &(0x7f0000000340)='/dev/fuse\x00', &(0x7f0000000380)='fuse\x00'], &(0x7f0000000580)=[&(0x7f0000000400)=')wlan1\\posix_acl_access,proc\x00', &(0x7f0000000440)='G\x00', &(0x7f0000000480)='/dev/fuse\x00', &(0x7f00000004c0)='fuse\x00', &(0x7f0000000500)='fuse\x00', &(0x7f0000000540)='fuse\x00'], 0x1800) umount2(&(0x7f0000000000)='./file0\x00', 0x0) recvfrom$rose(r0, &(0x7f0000000780)=""/4096, 0x1000, 0x2, &(0x7f0000001780)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000600)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000850) 21:31:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) [ 437.465955] kernel msg: ebtables bug: please report to author: bad policy [ 437.498989] kvm [22033]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 21:31:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00 \x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 437.512157] kernel msg: ebtables bug: please report to author: bad policy [ 437.523143] kvm [22033]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 21:31:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x221}], 0x1, 0x0) 21:31:28 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000500)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x20002, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@fowner_gt={'fowner>', r3}}, {@pcr={'pcr', 0x3d, 0x23}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@subj_user={'subj_user', 0x3d, '#vboxnet0'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='ed=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:28 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0xffffffffffffffda, 0x6, {0x3, 0x0, 0x8, 0x5}}, 0x20) [ 437.608968] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="64260f960d0f7530360fd2d9baf80c66b8a656878066efbafc0cb8e6f2efbaf80c66b80718668166efbafc0cb0d3ee0f01cbbaf80c66b84732198866efbafc0cb000ee0f0017f20f5824dbe0"}], 0xaaaaaaaaaaaad8d, 0x0, 0x0, 0x4f) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) [ 437.697790] kernel msg: ebtables bug: please report to author: bad policy 21:31:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00?\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:29 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x227}], 0x1, 0x0) [ 437.754575] kernel msg: ebtables bug: please report to author: bad policy 21:31:29 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000180)={0x0, {0x8d93, 0x9, 0x7, 0x100}, {0xffff, 0x154, 0x1, 0xfff}, {0x1, 0x40}}) umount2(&(0x7f0000000000)='./file0\x00', 0x8) 21:31:29 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x198, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x80000001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4dc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x24}}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff9}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x58cc}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @rand_addr=0x81}}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x8000}, 0x400c014) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00`\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:29 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x22e}], 0x1, 0x0) [ 437.886092] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" [ 437.903999] kernel msg: ebtables bug: please report to author: bad policy 21:31:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:29 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) write$P9_RLERROR(r0, &(0x7f0000000040)={0xb, 0x7, 0x1, {0x2, ':!'}}, 0xb) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 438.047757] kernel msg: ebtables bug: please report to author: bad policy 21:31:29 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x237}], 0x1, 0x0) 21:31:29 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000040)='statm\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20001, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000080)={0x0, {0x40, 0xa1c8}}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000840)=0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2080}, 0xc, &(0x7f0000000980)={&(0x7f0000000880)={0xd8, 0x8, 0x7, 0x0, 0x70bd2c, 0x25dfdbfe, {0x7}, [@nested={0xc4, 0x6f, [@generic="dab3e755ec18568490b371", @typed={0x8, 0x26, @pid=r3}, @generic="3751a3198e607e19bacf8a5b0cd61856e37912de98f9e7341541a72a6e786aa028e2924c21e8e9b76301096ac803d557a2a6803ebf8333b70a62a28af507f474503f708b2f391b7220cedb8cfe8ee1f9c4c4173f663d6db76a3294c242c318ab123fec2f464efef3a6c618decf47cb90bf67f1844e7b88d9102949b702bdfc2db195e9904bdc0ef9c5f3315507421f4fcfc547802a849604864aff882114ac224c69dd", @typed={0x8, 0x4d, @ipv4=@remote}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x80}, 0x0) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) mq_timedsend(r2, &(0x7f0000000680)="90ad0ca69f87448edf6f067d58e1622bbd41a3fd1c0805405cb9ca53fcab41178e2c590a223bb8ff6699b922cdc7f77ef19f954ffdbe03cce4a7ef9dafcad93a5a899d97392f2aae27cca279dc44cee6e03da503f7cd680037808f88a20cf02ffb245c1adcff9f26f59ba5d00d7da2", 0x6f, 0x8, &(0x7f0000000740)={r4, r5+10000000}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000180)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000780)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x7, @bcast, @rose={'rose', 0x0}, 0x8, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000a00)={0x6, 0x6}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.nlink\x00', &(0x7f0000000640)={'U-', 0x7}, 0x28, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x200, 0x0) 21:31:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x01\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:29 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x23a}], 0x1, 0x0) 21:31:29 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r0}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:29 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000200)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_SVE_SET_VL(0x32, 0x14574) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESOCT, @ANYRES32=r2, @ANYPTR]], @ANYBLOB="2c330cc2b4d9f05f9d7adda64329d2934dd3916fdd3a989e53ebaee56a4b0c6a25053e378be556821e16e1616a25896a3a18721d79a175", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) close(r3) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:30 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_extract_tcp_res(&(0x7f0000000180), 0x7, 0x101) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f753d00000000ce0dcaa870e1f8f5f050c8afb1e6e3d1f2b3e01fc79e089f337c77838da99387be9824564d397a44e6e279febf3343e272450d6354ead48bb37cbc989a776f5c9eb61865f37248938fdec1449f4f9d8ca8d1f9abcac72d5c38e2c9529316f1855ef2821385413abdcd6fd804777f8ac9c34b00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0xa0, 0x700000000000, "585828f1cee4077d09f66d127d960d767769a6f744a6b159ea8258f487cb7c9c80a593737d75cc26edd46fd39cc2611d765a2424e893e7795e6445942a284cdfbfbeed0811160fb16e3acfdd187e984b67fe174d435ff62267d03ccdbf98a66684bfc9a7ba35c8192497f0b22d4a1f8e5cf2c0d5cc431f6c532afc6c6cde899992320785f5aa7a58307b5160e9d6f641ecda9ef76d63a62a"}, &(0x7f0000000140), 0x400) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x23f}], 0x1, 0x0) [ 438.751799] kernel msg: ebtables bug: please report to author: bad policy 21:31:30 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 21:31:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(0x0, &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="96e68cae6a5977a7a0850602773e219c60b45c9227185a406925a78157b639ebb8abd9b1de339c3c1b308aaf599a1a39ac64b13e7e4966c6b211d91218a55bccb4425d9cea9de0a7a9e1cd59d1e4c99eeeee15229ae57964a9f178344639fb006ff9a1a57d8c68f7783999e2990d96b5daaa790d1e881d2ede8a87bee49b0a253821cc4917246becce3a015c9c43d04c595f1a6e868b2efb65a1bf79a84ac08a2b35139abc9fb6fb086025b933140bd1d54f98fd1b9dc4a41aaf64a6b4678e6f0c3744f9c9fc537347a365ca86d0530d0d02383bdfb1230f0a5ff68725628ffd6c16b419b40f6617a707290f11bcb4a289aa6b2905a457a012489b", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x02\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x240}], 0x1, 0x0) 21:31:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:30 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000140)={0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0xd, &(0x7f0000000140)=""/116, &(0x7f00000001c0)=0x74) close(0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:30 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}}) linkat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x1000) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)) [ 439.137268] kernel msg: ebtables bug: please report to author: bad policy 21:31:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x245}], 0x1, 0x0) 21:31:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', 0x0, 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:30 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='trusted.syz\x00', &(0x7f00000001c0)=""/145, 0x91) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000340)='./file0\x00', 0x0) 21:31:30 executing program 2: r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2b, 0x4, 0x0, {0x3, 0xffffffffffffffff, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6964efb309ba514fd25130ea4eba473d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pipe2(&(0x7f0000000180), 0x80000) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 439.288399] kvm [22356]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 21:31:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x03\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 439.381161] kvm: pic: non byte read 21:31:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x248}], 0x1, 0x0) [ 439.405583] kvm: pic: non byte read [ 439.420410] kvm: pic: non byte read 21:31:30 executing program 0: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) fdatasync(r0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0xf7b, 'syz0\x00', @bcast, 0xe80, 0x8, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000340)='./file0\x00', 0x1000000000001) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000001c0)) 21:31:30 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x100000000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=''}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x255}], 0x1, 0x0) 21:31:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x04\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:31 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x40000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d7364653d30303030303030303030303030303030303130303030302c757365725f69643dd6", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', 0x0, 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:31 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0200000000000000000000000000000000"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 439.766776] kvm: pic: non byte read [ 439.786463] kernel msg: ebtables bug: please report to author: bad policy [ 439.796014] kvm: pic: non byte read [ 439.811515] kvm: pic: non byte read 21:31:31 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x274}], 0x1, 0x0) 21:31:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x05\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00') mq_timedsend(r4, &(0x7f0000000180)="07dce94d3632da88ad90e719dff985b4001befc6b5190fa922ef79af3db8bcd085f6e0cc1c7fc2f6370b67ded6d9d1f071b5347ba42fade8b815748d0f5cc1e760dfbc26f45032227776bff322f15d479ac4eac4143f72a9b072a237003ce87fc452c692af816105", 0x68, 0x1, 0x0) 21:31:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:31 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_GET_DUMPABLE(0x3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c723030303030303030303030304ad8c83845265013b4859d3f909ee4fd38ffcb1abd9f30301130303030302c000000000071b663f2000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x40, 0x0, 0x4, 0x21000000, {0x77359400}, {0x1, 0x8, 0x9, 0x1a58bf35, 0x1, 0x7fff, "3c731c1c"}, 0x1, 0x5, @planes=&(0x7f0000000040)={0x3, 0x5, @fd=r0, 0x3}, 0x4}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000240)=0x6e, 0x347) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$update(0x2, r2, &(0x7f00000003c0)="cd574586cf4e2ffb8484e29f2b73697f2f52641170d47b11a54bd55c09bce704c9fe0894f394edfc8162e5315bd7fd701cfd33e7e6d17da8588973d553bb5385aaaae40477a624912c5c173f35a598f35d9e2eea660ceeac6ece534fcb77", 0x5e) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:31 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000180)={'ip6erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}}) mkdirat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x1ff) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64f43d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="0000000000000006cb34", @ANYRESDEC=0x0, @ANYBLOB="1002"]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ipddp0\x00', 0x10) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='westwood\x00', 0x9) socket$can_raw(0x1d, 0x3, 0x1) [ 439.998342] kernel msg: ebtables bug: please report to author: bad policy 21:31:31 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x27d}], 0x1, 0x0) [ 440.122888] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x06\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:31 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00e02bf74fbb92e82fde757f12dcfbc4f2347d0327dc2a726d0324bf66a9c0a5acd257d8b7e34d43cb664aaf63ed502b0135ec82ae36e7ae91e5fe9153776153a5cd9bfd4ec25023d2b34563bbb25f5c52010b319de219ae003c1fc3830baaaa90c0111cedc550a6cd84cd5f002f566047cd898dd3c10a532cf13e845a653b7a001b7e65d844cd35185389cdf10c00a4e6fcb351dfdf4e8852450493a60fdda9c6263a8e66124ff722"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:31 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x2) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)={0xe, 0x8, 0xffffffff, 0x2, 0x34, "493e8005194aa88587fd3cef0374d45084e04b3d030f4900e50e67a12420d10a6604b594841556de621c5cc1b2c974977df635d2"}, 0x40) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c54726f7570d49c643d", @ANYRESDEC=0x0, @ANYBLOB="acfa"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0xfffffffffffffff7}, 0x28, 0x1) 21:31:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 440.318352] kernel msg: ebtables bug: please report to author: bad policy 21:31:31 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x288}], 0x1, 0x0) [ 440.369203] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:31 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000300)=""/195) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000200)={0x10000000}) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$getenv(0x4201, r2, 0x9, &(0x7f00000001c0)) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0xda, "56c0d4ad88b8ebe6881f220207fb4896c16bcc8287ecfc93cd27767515733d73f08123d455b8e1b96d22655fb631f84c147b96bb19720dccd93d65dfcbd4a16b2ed2a8e0fe4292460e42c194c2243fc1617e529189a5dd21a362647fcae6299ce027c5667b07a0bdfea7d61435829399987b9740ae8570620cba8a9d1b03d27f3c045c287bafd4206943d603f5b9d60f3e9b91911462414ef588938f09ea6a4c6d016e9401a0d15ccb30c6518a3792f418c4a17c15e142c63b9db274d569985f270fd9e41ef1f94fadca9a44fd87bebcb1abdf7ce829418375f5"}, &(0x7f0000000240)=0xe2) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000500)={r3, 0x1, 0x8da0, 0xfffffffffffffffd}, 0x10) 21:31:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) 21:31:31 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030302c40f365725f6982cbf8643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@known='system.posix_acl_default\x00', &(0x7f00000003c0)='fuse\x00', 0x5, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'lo\x00', r2}) [ 440.530773] kvm: pic: non byte read 21:31:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\a\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:31 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x289}], 0x1, 0x0) 21:31:32 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 440.650939] kernel msg: ebtables bug: please report to author: bad policy [ 440.676009] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, '\x00', 0x7}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00 \x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:32 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303031303030300d2c757365725f69643d39d4589aa5c08c486df9f9dfadb059b9146b4c9ed98f04000000fa1f48221941f0319f3db264e76a77b02fb4d56fc2bb03282ff2906b5aecad72f694bebd30540a8744faf0237d1796063e315e34e46a77a4ab5e11b3f675cf41e9af2befc68547311e260ec08f33ac799a3f5512e00d0b8c01a27454a58d64b522dd228d30d47c8a24174e546c02a46f6b64f849ec774e43ecafed3a6f19be04daf3dc43a7ee194c105d0db1da9b7fbaef65f8f748c342857d510d7b1a6eaebe1b69f0c3f231a2", @ANYBLOB="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", @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\a\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 440.764321] net_ratelimit: 18 callbacks suppressed [ 440.764329] protocol 88fb is buggy, dev hsr_slave_0 [ 440.774417] protocol 88fb is buggy, dev hsr_slave_1 [ 440.779520] protocol 88fb is buggy, dev hsr_slave_0 [ 440.784619] protocol 88fb is buggy, dev hsr_slave_1 21:31:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:32 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x296}], 0x1, 0x0) [ 440.895826] kernel msg: ebtables bug: please report to author: bad policy 21:31:32 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="66643d2718b1b9ca356291cdc53763da29748e815e153ec0e3a9975038b034bb3fe929cee551fbd6c53bdd7fe2e8b9b8028d6978970632df702fce7c499127e854b836e5945d26b2bc0fee4f0bc3586b20a8764d9fbb7d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30e18677578c85320fe77ac33030303030303030303030303030303031303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_delrule={0x28, 0x21, 0x4, 0x70bd2b, 0x25dfdbfd, {0xa, 0x10, 0x10, 0xfffffffffffffc00, 0x1}, [@FIB_RULE_POLICY=@FRA_GOTO={0x8, 0x4, 0x49}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000800}, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0xffffffffffffffff, 0xfc000000, 0x9, 0x6}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r2, 0x7fffffff}, 0x8) 21:31:32 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd-', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="d539d46f71bee4708a1da59f07b6159d7c70c0e84a14bf091a1093cd9b7c8daac252af50a6d0e94f4087f1744e82615143206d93c15140fa6899983f7bb8900d09a197ab4e418a32e9cfb9f6ec3366051e3d36940f46d619fead1c11c5c0ba45dd365723b470e43158544894b9a27a935eabda3abd3073b43be4090fb8079ab40066f1c5a90c7c2416d481809fa6e250f53568dead37eff68f66ae3c4b1a12bdf911a9f475603e9e0ce34e790680e256a579035fde39d9d0bda5"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00?\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 441.007448] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:32 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x297}], 0x1, 0x0) [ 441.084321] protocol 88fb is buggy, dev hsr_slave_0 [ 441.089482] protocol 88fb is buggy, dev hsr_slave_1 21:31:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, r4, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x29}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x20000000) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 21:31:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:32 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x10000, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xdc5077cfbcc80a98}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x80000001}}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@dont_appraise='dont_appraise'}, {@audit='audit'}, {@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@permit_directio='permit_directio'}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000540)={0x0, 0x1}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000005c0)={r6, @in6={{0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x14}, 0xfffffffffffffffe}}}, 0x84) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x8b0) [ 441.182824] kernel msg: ebtables bug: please report to author: bad policy 21:31:32 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) getgroups(0x6, &(0x7f0000000300)=[0x0, 0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xee01]) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000003c0)=[0x0, 0x0, 0xffffffffffffffff, 0xee00, 0x0, 0xee00, 0xee00, 0x0]) r5 = getegid() r6 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [{0x2, 0x5, r1}], {0x4, 0x5}, [{0x8, 0x1, r2}, {0x8, 0x2, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x0, r6}], {0x10, 0x2}, {0x20, 0x7}}, 0x54, 0x3) [ 441.300991] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 441.324324] protocol 88fb is buggy, dev hsr_slave_0 [ 441.329463] protocol 88fb is buggy, dev hsr_slave_1 21:31:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00`\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 441.374963] kvm_hv_set_msr: 26 callbacks suppressed [ 441.374979] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 441.407137] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 21:31:32 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x298}], 0x1, 0x0) 21:31:32 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYRES64=0x0, @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030302c757365725f69643d0000000000000041dc8baa75cc10cbb886b8c22523f37d1f261912e166a9793669f6c2a5cadd2e9d0f659971ecaeee5297907f4947015ee9e47fdb0c3f996f5b51d6b5868fd44caeea4da8ce5424c9da629e273dff7278f3cebf8e32ef7431aadfa0d8d6", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1, @ANYRES64=r1, @ANYRESOCT=r1, @ANYRES16, @ANYBLOB="1bc6fa610a585a1a272c0ee99bb86a535fe23abf3077fb6be896df28cd838382649e96cef37112a98f1e16dd5e9bcac1a4b91ec7436129122e6def2bdf13c68afc2ab00882013451527f49cac940f6950b390b12a8f2db99a715f38f4723a27e1459706a87f6c51257f7fae0bd4bb42f889fea4250bd6c899cc235ee708d801df858a759b97c9a9ca9e2b95866", @ANYRESDEC=r1, @ANYRESOCT=r1, @ANYPTR, @ANYRES32=r1], @ANYRESOCT=r1], @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES64=r0, @ANYRES16=r1, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC=r1, @ANYPTR64, @ANYRES32=r1, @ANYPTR64, @ANYPTR64, @ANYRESDEC=r0, @ANYRES32=0x0], @ANYRES16=r0, @ANYRESHEX=r0, @ANYRESHEX=r1]]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800, 0x0) 21:31:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:32 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@measure='measure'}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 441.449372] picdev_read: 5 callbacks suppressed [ 441.449378] kvm: pic: non byte read [ 441.480494] kvm: pic: non byte read [ 441.502947] kvm: pic: non byte read [ 441.513835] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 [ 441.523173] kernel msg: ebtables bug: please report to author: bad policy [ 441.553088] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 441.581792] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 441.615784] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000000d data 0x0 [ 441.626350] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:32 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030b6f39712359d0a3830307830315fd4aec0dd8d9394f3764e9330303030302c5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) faccessat(r0, &(0x7f0000000300)='./file1\x00', 0x40, 0x200) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000180)=""/167, &(0x7f0000000040)=0xa7) ioctl(r2, 0x6, &(0x7f00000003c0)="3a8462d3dbedcafac6b7039444ddec295362a2f0fcfa222db507c3450c83257d9598b3f4f619f5a727a0920ff7b472b6b34c829176ecda7a43a851566e7a2661a080191f37d47adc7a890c8985d54440e68537a29e026cc7f189033be74bc40e35cedc92a2afa49b97e9c4e913bbfd7136e71a") ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000100)=0x5f) 21:31:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2a0}], 0x1, 0x0) 21:31:33 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74826f64653d30303030303030303030303030303030303130303030302c757365725f69643dd0d437bde052cbc7000000003ee0fbcfd2c76c354295b3e8758bb8ce0f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) socket$pppoe(0x18, 0x1, 0x0) [ 441.656057] kvm [23212]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 [ 441.724327] protocol 88fb is buggy, dev hsr_slave_0 [ 441.729524] protocol 88fb is buggy, dev hsr_slave_1 21:31:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x1000006, 0x8010, r1, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000080)=0x6, &(0x7f0000000180)=0x1) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000001c0)={0x1, 0x0, [{0x20, 0x0, 0x6}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:33 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x63, 0x80) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000001300)=""/4096) r2 = syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xe778, 0x40001) r3 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) mount$9p_unix(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x14000, &(0x7f00000004c0)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, '/[nodevselinuxnodev/md5sum]'}}, {@aname={'aname', 0x3d, 'fuse\x00'}}, {@debug={'debug', 0x3d, 0x8001}}, {@fscache='fscache'}, {@loose='loose'}, {@cache_none='cache=none'}, {@access_uid={'access', 0x3d, r3}}, {@aname={'aname', 0x3d, 'wlan0md5sum]'}}, {@loose='loose'}, {@fscache='fscache'}], [{@uid_gt={'uid>'}}, {@fsmagic={'fsmagic', 0x3d, 0x9c}}, {@dont_hash='dont_hash'}, {@euid_eq={'euid', 0x3d, r4}}, {@context={'context', 0x3d, 'system_u'}}, {@appraise_type='appraise_type=imasig'}, {@smackfstransmute={'smackfstransmute', 0x3d, '%^'}}]}}) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000)={0xa, 0x9, 0x2, 0x4367}, 0xa) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="66fb3d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='m\x00']) 21:31:33 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000180)=0xc) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2a3}], 0x1, 0x0) 21:31:33 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfff, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000080)="e3635e1b6ddf4c98c4951c596679985fc85dcc06cf472af9", 0x18, 0x9}, {&(0x7f0000000140)="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", 0xfb, 0x100000000}, {&(0x7f00000000c0)="2b2eb24075e00430bdcdb63ba1545b669ad4a91ad13246d2ab168d3d0764f7f8cfd76aee9a38650862db4a5bb0b686e4e3040fe63a92e3edef186310554784af", 0x40, 0x4}, {&(0x7f0000000240)="0e464cf91efc43835116c247afbe05155ad9df2a10add927d6f095e956ea55445d1eb28c1317b17f5f9ee86877c531314d37ab583d8ad35faaf472986135b7e6d0e137307c6917a08cdd21789f39dd0d8b18623504f244aa1d641b935a229950f7fd5c0c2b09aaeb4d8dd63086dc766e55cefd53ceb53e5b", 0x78, 0x20}, {&(0x7f00000002c0)="980ea0aaab9f73ede38a0105505f87bd96de90e670cb1bdf8674679f01b5dcd7390416aab23d5b4d6a55e0ff8bbd300d245c70f3f3c8bfcedf2ea003fa598c9f26b65ab66ac55e55af40bc230c8720ee2be17ce98d0d661323e64c0eb0a47f998847b9b2e398ca13cb477644862564e8d839bd623f1315a151c251a8aad0ae3c5469b1c2d9b2148a7e6fda9217666587d989478f0589f2eeab8d69e835c5078d98fa7c8ac40a6c4eee4ad5527b92d79b14579e45bff1635d933a2484a750e08be851e404a23c11ddf45a384b720ec9fe763d04e5bfc6b38b29bec922810637de6fe20124f207664502dd7f3c4c9bce9730f85d", 0xf3, 0xffffffff}], 0x1200000, &(0x7f0000000440)={[{@usrjquota_file='usrjquota=syz'}], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, '-vmnet0nodev-cpusetkeyringvmnet1**@&vmnet0em1'}}]}) [ 441.971451] kernel msg: ebtables bug: please report to author: bad policy [ 442.017507] 9pnet: p9_fd_create_unix (23460): problem connecting socket: : -111 [ 442.028408] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "audit" 21:31:33 executing program 2: r0 = creat(&(0x7f0000000380)='./file0\x00', 0x140) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000180)=[@in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0xffffffffffffffff, @dev={0xfe, 0x80, [], 0x13}, 0x7}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r2, 0x400, 0x10}, &(0x7f0000000300)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 442.086150] kvm [23456]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 442.099493] 9pnet: p9_fd_create_unix (23468): problem connecting socket: : -111 21:31:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2aa}], 0x1, 0x0) 21:31:33 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:33 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffc) [ 442.174714] kvm [23456]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 442.243191] kvm: pic: non byte read [ 442.265635] kernel msg: ebtables bug: please report to author: bad policy [ 442.273958] kvm [23456]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000066 data 0x0 [ 442.304945] FAULT_INJECTION: forcing a failure. [ 442.304945] name failslab, interval 1, probability 0, space 0, times 0 [ 442.349624] CPU: 1 PID: 23597 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 442.356960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.366326] Call Trace: [ 442.368942] dump_stack+0x172/0x1f0 [ 442.372598] should_fail.cold+0xa/0x1b [ 442.376508] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 442.381624] ? lock_downgrade+0x810/0x810 [ 442.385790] ? ___might_sleep+0x163/0x280 [ 442.389960] __should_failslab+0x121/0x190 [ 442.394210] should_failslab+0x9/0x14 [ 442.398025] __kmalloc+0x2dc/0x740 [ 442.401579] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 442.407137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 442.412691] ? strnlen_user+0x1f0/0x280 [ 442.416752] ? __x64_sys_memfd_create+0x13c/0x470 [ 442.421626] __x64_sys_memfd_create+0x13c/0x470 [ 442.426328] ? memfd_fcntl+0x1550/0x1550 [ 442.430408] ? do_syscall_64+0x26/0x610 [ 442.434397] ? lockdep_hardirqs_on+0x415/0x5d0 [ 442.438991] ? trace_hardirqs_on+0x67/0x230 [ 442.443341] do_syscall_64+0x103/0x610 [ 442.447248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.452454] RIP: 0033:0x457e29 [ 442.455664] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.474589] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 442.482332] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 442.489620] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 21:31:33 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6465c5d54fa52ca79b94303030300300303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 442.496907] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 442.504187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ce31206d4 [ 442.511472] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000004 21:31:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x02\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2b0}], 0x1, 0x0) 21:31:34 executing program 2: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file1\x00', 0x4, 0x4, &(0x7f0000000240)=[{&(0x7f0000000840)="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", 0x1000, 0x4ce}, {&(0x7f0000000180)="c4ac7e75ae8d15958f3e09db84266e85c68692cb1f86f0c8b99b4aa1cfa26093d7744ef4fe579e1c38da7167cf11ba4c5e17f0c074698123f700282009a4", 0x3e, 0xcd11}, {&(0x7f0000000300)="f6f385d7cd7cf00cdb8d83fca0f041506386de828adfab23f50a2f7106f41f5e73246974b6fccaeb4fb1bd64dca4bb4e20c0e7ed85065ec331c0d2fa7a0950568a2bd9c54664365505f1b0a11dec1461bc66d824956d3e794ecaacd6057a57816445095573d28c77ec2a9e8a14ecb61340fbc5762525bcb23ba2d699adcb1450206dee0a22184a36f77385b1644267244e935c22cc48657b2331a19e06d1cd55b6f878a8bb8609e3325f088c6a05049282f8b26a27d1087d19b2c16413a0dcb45e1db803480af27702cc081ce800badad7634f874f189559393cce5b3bb372d49d81da80b6aae2", 0xe7}, {&(0x7f0000001840)="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", 0x1000, 0x20}], 0x1802021, &(0x7f0000000400)='/dev/fuse\x00') r0 = socket$inet(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4400, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000001c0)=0x5) fcntl$setflags(r0, 0x2, 0x1) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0), 0x0, 0x0, 0x30a}, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e29379784852fb09d5dd4184e64f790c496b2d72480b695e2711cb75e3d2e7542606b495c656fce7aa5cb65f0ce78f5d55c89738dc122a26d5d773b065d1b90d8258a6139eeae3"]) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x9) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 21:31:34 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) r3 = getuid() mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x9c4c9, &(0x7f0000000280)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}, {@privport='privport'}], [{@seclabel='seclabel'}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@appraise='appraise'}, {@obj_type={'obj_type', 0x3d, '%\'+^\\nodev'}}, {@fowner_gt={'fowner>', r2}}, {@euid_gt={'euid>', r3}}]}}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:31:34 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000}, 0x1c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79, 0x0, [0x6, 0xfffffffffffffff7, 0xfffffffffffffff9, 0x3]}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000000)={{0x95, 0x4, 0x4, 0x80, 0x9, 0x5}, 0x10000000000, 0x4c, 0x7}) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 442.899912] FAULT_INJECTION: forcing a failure. [ 442.899912] name failslab, interval 1, probability 0, space 0, times 0 [ 442.915732] kernel msg: ebtables bug: please report to author: bad policy [ 442.956000] CPU: 0 PID: 23701 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 442.963330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.972694] Call Trace: [ 442.975321] dump_stack+0x172/0x1f0 [ 442.978978] should_fail.cold+0xa/0x1b [ 442.982884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 442.988008] ? lock_downgrade+0x810/0x810 [ 442.992351] ? ___might_sleep+0x163/0x280 [ 442.996526] __should_failslab+0x121/0x190 [ 443.000775] ? shmem_destroy_callback+0xc0/0xc0 [ 443.005460] should_failslab+0x9/0x14 [ 443.009280] kmem_cache_alloc+0x2b2/0x6f0 [ 443.013458] ? __alloc_fd+0x430/0x530 [ 443.017273] ? shmem_destroy_callback+0xc0/0xc0 [ 443.021968] shmem_alloc_inode+0x1c/0x50 [ 443.026047] alloc_inode+0x66/0x190 [ 443.029689] new_inode_pseudo+0x19/0xf0 [ 443.033677] new_inode+0x1f/0x40 [ 443.037058] shmem_get_inode+0x84/0x780 [ 443.041051] __shmem_file_setup.part.0+0x7e/0x2b0 [ 443.045915] shmem_file_setup+0x66/0x90 [ 443.049909] __x64_sys_memfd_create+0x2a2/0x470 [ 443.054596] ? memfd_fcntl+0x1550/0x1550 [ 443.058663] ? do_syscall_64+0x26/0x610 [ 443.062651] ? lockdep_hardirqs_on+0x415/0x5d0 [ 443.067249] ? trace_hardirqs_on+0x67/0x230 [ 443.067802] kvm: pic: non byte read [ 443.071604] do_syscall_64+0x103/0x610 [ 443.071627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.071643] RIP: 0033:0x457e29 [ 443.079161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:31:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x03\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2b7}], 0x1, 0x0) 21:31:34 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="37aa95", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dc048d1343604007a0a28657993af0c03e6c0b5f3a65a4175315bdb1c267496a5b67c02bb456c913442294e94e8c41bafbbf512dc263f19241fa2c533c3e98560488ebb243dea665da0eba0a8c93ab8686cf622a98de525f566238032ff7b26fdb38d80e389ae01e81046fde1ec970ffed555cd34a4e558d73c6228c9e963e63f0160f4e93b59d4253c684802eb3ca133995c7b363c73f6ff", @ANYRESDEC=0x0, @ANYBLOB="2300143e9eda95d57a3d6631b893fe2d6e25dde189481b92c021087edf00cb2564675ee1eb91d0de55f4ec19ff1618c54a9b57301f04b8102e3e6deb12f4069f139424c8f6c79c36b3b6b27856059fc00d39eff737cd00e7494074b60326a323e613f31cac6cbd48b09cdc6d98285fbef58e1ed2acfb1cba642a16612b52a848d4c5bece3dae1d1765936b6074"]) umount2(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) r1 = gettid() move_pages(r1, 0x17, &(0x7f0000000200)=[&(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff2000/0x4000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil], &(0x7f0000000100), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x2) [ 443.079171] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 443.079187] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 443.079195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 443.079208] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 443.114188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ce31206d4 [ 443.114199] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000004 [ 443.129384] kvm: pic: non byte read 21:31:34 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 443.178636] kvm: pic: non byte read [ 443.287400] FAULT_INJECTION: forcing a failure. [ 443.287400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.299249] CPU: 1 PID: 23823 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 443.306539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.315901] Call Trace: [ 443.318508] dump_stack+0x172/0x1f0 [ 443.322171] should_fail.cold+0xa/0x1b [ 443.326085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 443.331204] ? mark_held_locks+0x100/0x100 [ 443.335461] should_fail_alloc_page+0x50/0x60 [ 443.339977] __alloc_pages_nodemask+0x1a1/0x710 [ 443.344668] ? find_held_lock+0x35/0x130 [ 443.348750] ? __alloc_pages_slowpath+0x2900/0x2900 [ 443.353796] cache_grow_begin+0x9c/0x8c0 [ 443.357874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.363426] ? check_preemption_disabled+0x48/0x290 [ 443.368460] kmem_cache_alloc+0x62d/0x6f0 [ 443.372627] ? shmem_destroy_callback+0xc0/0xc0 [ 443.377326] shmem_alloc_inode+0x1c/0x50 [ 443.381408] alloc_inode+0x66/0x190 [ 443.385045] new_inode_pseudo+0x19/0xf0 [ 443.389044] new_inode+0x1f/0x40 [ 443.392432] shmem_get_inode+0x84/0x780 [ 443.396432] __shmem_file_setup.part.0+0x7e/0x2b0 [ 443.401303] shmem_file_setup+0x66/0x90 [ 443.405308] __x64_sys_memfd_create+0x2a2/0x470 [ 443.409997] ? memfd_fcntl+0x1550/0x1550 [ 443.414070] ? do_syscall_64+0x26/0x610 [ 443.418064] ? lockdep_hardirqs_on+0x415/0x5d0 [ 443.422669] ? trace_hardirqs_on+0x67/0x230 [ 443.427007] do_syscall_64+0x103/0x610 [ 443.430914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.436112] RIP: 0033:0x457e29 [ 443.439326] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.458242] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 443.465975] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 443.473254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 443.480547] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 21:31:34 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getresuid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 443.487819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ce31206d4 [ 443.495103] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000004 21:31:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2c0}], 0x1, 0x0) 21:31:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000340)=0x9, 0x1f) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x3ff, 0x10000) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff1b, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xd2267143d4779fa4, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e22, 0x7af8, @mcast1, 0xfff}}, 0x7ff, 0x4}, 0x90) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{}]}) 21:31:34 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000180)={r2}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='security.SMACK64\x00', &(0x7f0000000240)='/dev/fuse\x00', 0xa, 0x2) 21:31:35 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x4) 21:31:35 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000040)={0x39980732, r1}, &(0x7f0000000180)={0x20, 0x37bd0043, 0x80000001, 0x6, 0x2, 0x7a00000000000000}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000001c0)=0x4) [ 443.781657] kvm: pic: non byte read 21:31:35 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2c3}], 0x1, 0x0) [ 443.858068] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:35 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)=""/235, 0xeb) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) write$vhci(r0, &(0x7f0000000300)=@HCI_ACLDATA_PKT={0x2, "de954f8565ccab4c430a3054e592d52fa35d08f17ce49a067462ca1be4609c31fe6113971e3aaee8da347506906a0c4644d2344ee0321ed5dd8bff5b23dfec33b2039388644f9fb7b59f1f87523098226ea8b184f9dd23f9484cb0cb39e98309ca53085b3af62025a84348a38f07e3f2f9fea6fc391537801fddecb91e950b9fd7e601c879ab62d4a0516fae85b76cd268cc2efe7ccebc7403548e55ed4b8048d66071ede15483f45264344ba9875104a9d2f7b984077b52c75bd218f49025b4aeebc861f619940f1ba5c7a97de3a623cb3b53b83d"}, 0xd6) [ 444.715169] device bridge_slave_1 left promiscuous mode [ 444.720702] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.731656] device bridge_slave_0 left promiscuous mode [ 444.737572] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.875687] device hsr_slave_1 left promiscuous mode [ 444.900067] device hsr_slave_0 left promiscuous mode [ 444.919144] team0 (unregistering): Port device team_slave_1 removed [ 444.931902] team0 (unregistering): Port device team_slave_0 removed [ 444.943749] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 444.967147] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 445.043757] bond0 (unregistering): Released all slaves [ 445.884360] net_ratelimit: 20 callbacks suppressed [ 445.884370] protocol 88fb is buggy, dev hsr_slave_0 [ 445.894492] protocol 88fb is buggy, dev hsr_slave_1 [ 446.604367] protocol 88fb is buggy, dev hsr_slave_0 [ 446.609514] protocol 88fb is buggy, dev hsr_slave_1 [ 446.627375] IPVS: ftp: loaded support on port[0] = 21 [ 446.808347] chnl_net:caif_netlink_parms(): no params data found [ 446.926723] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.933188] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.940471] device bridge_slave_0 entered promiscuous mode [ 446.955329] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.962556] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.969922] device bridge_slave_1 entered promiscuous mode [ 446.989333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 446.999432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 447.004344] protocol 88fb is buggy, dev hsr_slave_0 [ 447.012100] protocol 88fb is buggy, dev hsr_slave_1 [ 447.028682] team0: Port device team_slave_0 added [ 447.045335] team0: Port device team_slave_1 added [ 447.091976] device hsr_slave_0 entered promiscuous mode [ 447.104732] device hsr_slave_1 entered promiscuous mode [ 447.134270] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.140657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.147375] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.153748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.199119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 447.212485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 447.220778] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.228259] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.245451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 447.257893] 8021q: adding VLAN 0 to HW filter on device team0 [ 447.269430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 447.277802] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.284184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.307398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 447.315382] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.321760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.328509] protocol 88fb is buggy, dev hsr_slave_0 [ 447.333606] protocol 88fb is buggy, dev hsr_slave_1 [ 447.349865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 447.364766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 447.372203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 447.380984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 447.392389] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 447.403683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 447.411735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 447.434093] 8021q: adding VLAN 0 to HW filter on device batadv0 21:31:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x04\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:38 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000040)=0x1000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="66643d0511d6c4f959d20324e5e08a31dfbf5fdd975947c06a35302008e83945d39da381772525e70a4e1326012ed20e366dc437b07cee3f99312042f1c0f2f4ccdd7138413cc0a7cc5791071ad6472899b44e4d06fe787d552c4b58b2f5da206fce21bd9a73b4e884ae72caeebfb7f86719e19ccf87633b9b0f5b1907a506f17a1dd6513adc3b01a35b81add69a004db4d985e0d153ae816e85ec9807b732bc1e1f071d92706ef3fb5b729e715d80abcfcce14ce7f54d3324dd572a5c080b6eaa9dc1d39d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x10001, 0x1, 0x2, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'\x00', 0xae1}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2c8}], 0x1, 0x0) 21:31:38 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x80000, 0x90) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:38 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 447.486644] kernel msg: ebtables bug: please report to author: bad policy [ 447.496267] kernel msg: ebtables bug: please report to author: bad policy [ 447.514321] protocol 88fb is buggy, dev hsr_slave_0 [ 447.519442] protocol 88fb is buggy, dev hsr_slave_1 [ 447.554699] FAULT_INJECTION: forcing a failure. [ 447.554699] name failslab, interval 1, probability 0, space 0, times 0 [ 447.619253] CPU: 1 PID: 23870 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 447.626627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.635999] Call Trace: [ 447.638611] dump_stack+0x172/0x1f0 [ 447.642265] should_fail.cold+0xa/0x1b [ 447.646184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 447.651313] ? lock_downgrade+0x810/0x810 [ 447.655497] ? ___might_sleep+0x163/0x280 [ 447.659666] __should_failslab+0x121/0x190 [ 447.663919] should_failslab+0x9/0x14 [ 447.667730] kmem_cache_alloc+0x2b2/0x6f0 [ 447.671892] ? current_time+0x6b/0x140 [ 447.675862] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 447.680979] ? lockdep_hardirqs_on+0x415/0x5d0 [ 447.680996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.681013] ? timespec64_trunc+0xf0/0x180 [ 447.681031] __d_alloc+0x2e/0x8c0 [ 447.695384] d_alloc_pseudo+0x1e/0x30 [ 447.695403] alloc_file_pseudo+0xe2/0x280 [ 447.695421] ? alloc_file+0x4d0/0x4d0 [ 447.695457] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 21:31:38 executing program 2: mkdir(&(0x7f0000000040)='\x00', 0x80) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 447.695476] ? kasan_check_write+0x14/0x20 [ 447.695497] __shmem_file_setup.part.0+0x108/0x2b0 [ 447.725373] shmem_file_setup+0x66/0x90 [ 447.729374] __x64_sys_memfd_create+0x2a2/0x470 [ 447.729396] ? memfd_fcntl+0x1550/0x1550 [ 447.729412] ? do_syscall_64+0x26/0x610 [ 447.729431] ? lockdep_hardirqs_on+0x415/0x5d0 [ 447.738179] ? trace_hardirqs_on+0x67/0x230 [ 447.751047] do_syscall_64+0x103/0x610 [ 447.751070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.751090] RIP: 0033:0x457e29 [ 447.763350] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.782275] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 447.790019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 447.797311] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 447.804598] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 447.811891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ce31206d4 21:31:39 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fbbb0", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x1004000, &(0x7f00000003c0)="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", &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000013c0)="158f4963396d7a63cfc8dbd5fbd2a0463eac3de7ede0aca32662f73dbbdd2dcdb73eabc7406ca7c540c6b1e5c568e7281ce4614f1df6968e211598df0f7b65fdf329") umount2(&(0x7f0000000380)='./file0\x00', 0x80000) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) 21:31:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2c9}], 0x1, 0x0) [ 447.819176] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000004 21:31:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x05\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 447.876542] kernel msg: ebtables bug: please report to author: bad policy [ 447.882252] kvm_hv_set_msr: 9 callbacks suppressed [ 447.882263] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 447.906017] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 21:31:39 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x2000) 21:31:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2ce}], 0x1, 0x0) [ 447.940349] kvm: pic: non byte read [ 447.945676] kvm: pic: non byte read [ 447.949514] kvm: pic: non byte read [ 447.953551] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 21:31:39 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 447.982389] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 448.009016] kernel msg: ebtables bug: please report to author: bad policy [ 448.023010] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 21:31:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x06\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 448.050551] kernel msg: ebtables bug: please report to author: bad policy [ 448.071617] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000000d data 0x0 [ 448.107820] kvm [23871]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000006 data 0x0 [ 448.180715] kernel msg: ebtables bug: please report to author: bad policy [ 448.213683] FAULT_INJECTION: forcing a failure. [ 448.213683] name failslab, interval 1, probability 0, space 0, times 0 21:31:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) r3 = dup(r2) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xee94, 0x7, 0x5, 0xffff}, {0x6, 0x7, 0x0, 0x9}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2d1}], 0x1, 0x0) 21:31:39 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000180)={0x1, 0x14000}) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$VT_ACTIVATE(r0, 0x5606, 0xa2) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:39 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) geteuid() r1 = geteuid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\a\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 448.231736] CPU: 1 PID: 23911 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 448.239036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.239043] Call Trace: [ 448.239071] dump_stack+0x172/0x1f0 [ 448.239105] should_fail.cold+0xa/0x1b [ 448.258649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 448.263771] ? lock_downgrade+0x810/0x810 [ 448.267932] ? ___might_sleep+0x163/0x280 [ 448.272108] __should_failslab+0x121/0x190 [ 448.276361] should_failslab+0x9/0x14 [ 448.280170] kmem_cache_alloc+0x2b2/0x6f0 [ 448.280198] __alloc_file+0x27/0x300 [ 448.280218] alloc_empty_file+0x72/0x170 [ 448.280236] alloc_file+0x5e/0x4d0 [ 448.292166] alloc_file_pseudo+0x189/0x280 [ 448.300143] ? alloc_file+0x4d0/0x4d0 [ 448.303965] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 448.309524] ? kasan_check_write+0x14/0x20 [ 448.310356] kernel msg: ebtables bug: please report to author: bad policy [ 448.313812] __shmem_file_setup.part.0+0x108/0x2b0 [ 448.313836] shmem_file_setup+0x66/0x90 [ 448.313857] __x64_sys_memfd_create+0x2a2/0x470 [ 448.313876] ? memfd_fcntl+0x1550/0x1550 [ 448.338419] ? do_syscall_64+0x26/0x610 [ 448.342428] ? lockdep_hardirqs_on+0x415/0x5d0 [ 448.347021] ? trace_hardirqs_on+0x67/0x230 [ 448.351349] do_syscall_64+0x103/0x610 [ 448.355246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.360439] RIP: 0033:0x457e29 [ 448.363635] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:31:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00`\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 448.382553] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 448.390292] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 448.397571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 448.404842] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 448.412113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ce31206d4 [ 448.419382] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000004 21:31:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2de}], 0x1, 0x0) 21:31:39 executing program 0: r0 = creat(&(0x7f0000001640)='./file1\x00', 0x1) r1 = getuid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x624, 0x9, &(0x7f0000001680)=[{&(0x7f0000000300)="46fb48715cb5254627bfb89ba808352801b7d8614149b268cf9732abeb022076551b3488cfa715e3c09ab45d69e9cbef4bf0e7b07ba5fdb103828633413214b4467c94e3e36277a136a9bf1945e213caf4bbdf02af205b2c76db13c5dfde62d7df6841e250e3989c3286a0020db44cd46b637858c4925a79c72120cd46a7c6979d0d6a5e8ce419b0bbd7e2eb9f2d3206edf055ad666f603932ec36aebe6f4b1368164762bd82bda46955a4719bcd64e8ab99b3ddee87ff842ddb88db41f9d8c37824890daa52d20c7c8faea8e2d5dc40632c364e689ac51b0f2fd9933d94e5254a", 0xe1, 0x7}, {&(0x7f00000001c0)="2050b8a2d3fd563df6803146a1cd576979b8897e09a67b5fbec514f7ddbbc753f956e6a747f16fb30832deba4fce075f6e01515d18e25de6d5fde36a4cc2d31d48a4e909b025dfc0586ef881c4f3acf3d6d87f4e7fd2553973aa498e2cae11edd7d776bec177a06db6a8173c1ca0b9dd2c6da6455617788d8904cfbc780863f23e681e95570943e7d5be42f1402c792027790fe3c659afdd39a32e759285a15c525cc0f6", 0xa4, 0x3}, {&(0x7f0000000400)="85619f97e25269efb4c11b651051d0b044f95e73919c4c63852d8836bcca3d65ab1d806cb6e977af1a424b8ad4310eddeb85ff93419abd24ec15ae743c9240005e087df2194b29cd9595c3827f66c623740945c893d24ddaa1d3a93baa6511ba00c0", 0x62, 0x8}, {&(0x7f0000000480)="c0ca93e45f0b19", 0x7, 0x1}, {&(0x7f00000004c0)="0d1d945754c59b541dfa33ad8a53b4f38946d5d2727b9e8b762831d43bd80f0403ca0bcc02a3f67a420a5cbef368dbda971ada8436237e597015ba87aba087846f4f0e5576f7bbcb7e2b591e528207a257badc2758e769ff1973f242e7e19de5084f4e8c407a44616511052a71338a70130a97777f980309461299550f39bbdbd779cc9148facd2054aa1a8f37a4ded88f0128144e96d8ca9d45e7d841cd8b12823596d5e55acb31d36065558be96daf1143648f5f15250b1fb68eb51d9e3d8979bcce8f20f537aa66a27ee0785b62ba8b6a94dc461249fd9e8c43222eaef02d146dc2c8c96f70bc738ae36a7ffa7f09fc98101fbca3c1ad7377827d71070b65764dd524b33e7d12e8079855a16030e67e4e176d1accea2562c74c06b907e3629b6c1cb212d5a7d5dadfc3f7f04a07e897405ff0f14dac1176a6c1e96313b9937d6a1730c22da4af9f11e212f02559100378f589b535bdcfc25be721724bd8ee499eac4bdb611947ba6842f9a155e2ef422131ac72167828ccb2d3d948bad8747ac4307638d807fc8b0b054548e6123a29564b21cbbca517af80582c7d0e7c55965178c981053ef006bae6a1b56e3a3258d94d0f626f5e9aed4b68c947c9518c44694ca77735d468fc60e207d644184c6c40157e6c5999661ff928203ccab723b08b04e4387cccac82ff2cda058017e0e2d58828d81b4020016de957fb1b47e38f292147dc87e1265891f8ef345a7fbb7fb8995ff8e44d5bfe6e072c973b1e55d394fd8ba9ad0dea836b453f1f0530b0f7312f9e32789bca49e3258b8ac397e1896bea9b9b575e661136735f9f23186b9a3d34ab152138bdc0f62e15674ec8662d97d0494f508adacaf5097274263e62341f701ec679ed9070eb3d7dd2b059e5ba4eee344f6891ba332970c64223946f8e5448669ab63177114592b1e5cf6a818937acc21887872442099fabae84b1d3107378d1b0ea045864f9fccd8353534381a6668e8aa7d0c3abf376dafcd23a6596dce1cc407a3f1b7a96b5f240911fefc539d15e793a7aed103a895fc41aa24724d9a0537b10466af16ad86da791939a1679ab6e82a34d148066c2744069cb5927f3b9815c019201dce647158d72e4f8774e48b955308fb3fe7c4e7f87faf5a9c06771449ef2aaac77c78d73ee1033451dbaf9f90ea2340f552d4da4850acc937a9a8aa73e5c04d2dd94b4e466ab888eb96f61e7ea933421c5594cd076983447b54404eb163a75eda217fcc3795789d9ce51d283f36d4fc76f33e32dc7d999f026193fdf81fc790761f513d3dafbb611d9a6850b933e66d189f45783d63edf6dfa7ec161f7d6574a7f2a2a11f68772fb72bcbf5332c932bec0a6f39d2265439665b253d8a503cf9d767ecdbe95d546b429c65319a44777ca2680dbfed852cc4946115a9d1b1e51296e6967066e417039989da22258ba004d24d70c8ddce2c3eb7464890ddde03e3b5fe92f0a3e91f510c2749b30b630698f61bfee1d59a6bf51388dccb412ee96afad279c8b493f1da635c54ca9c06b9e2daba3a293f406f1151ba6e2d1144fc2357c3e8449c0ccee5cbd9be1662e20835c64d683e93ee566084753cf5acc37ef3290cc85e30b95ee07dbb3d0ad982324f958e8561bc8a908810bfeef04fc8f3898ab94be6df05fba225b10b4db36e0628b3dd454b3f7f267504e0e519b2dccfb26c7b809bfd19fa50d05cac810b282b0213f889c9e3835eaa71ae3da86cd2059a3aafe24c54e7c4bfde553e7a34136be03c6e6450fe22944d509722dedd0d5bf880fb831c1cd43d45680f2d37325a34294320d14158a1f1580ad116f530d5d12644620a58fe12f254492daf214b4aea4ea2ed5c42cdd78f68ceca340dbabf64ce42517b22eaf7895848a0aec45ee8cdca6ea368761a6ec864280d618c8b907d5909883114a2488a0078fc61464756163439c3fb2c5b38b25154f761d3e68c0216043abeb115b23dede568f0c248a5cebedafde4b0dde013fae6f4cf76ea043cf9cc1e65b442cfbee263b04f7fea7309e8dc6f9394478bdf335bce6b7f3373ab3401ff2b8bb5e808121c0b0f63b2f61edc07f1488805805e65a510ab6de4a286f53383b4c15f6c10fb8f9ed66cdf31ce7c9d68d2beb9ee76c71162432689fbb3d1ff8daba1f0a983b1e7b8f7dc12b36a7497d673b0800adb0ced44254cb497cedc2be5d1f0b9dfd1a873c6c64a11c401cd30b3abec8f524c68af7e5b39717844b1a69fb945901232c1f5240bce52322c0726400158a817cc2db96e5a808643fb64a10513cf5a316251fdf23f87182ba54f968a411ed2ce773156b18d3f145b49cc22ccb4af056a89be889eba6d36ed250831f31c944b71a74176c23441f13210c98154c6a944dfba87474bcf6b8d93f707b406379504a1e1109cc1ed60b4d6a661bcc4b43f9106619b0d09e4de613bb971717a3dbf7a1c588c9748f0bc3731e947d8c05f89415470dc20d21b84f016f22c73b8f5714bffe421ab7e9f1625c2cb5935e94fb1b4b590ac882cbff694902467bf34c8db11271e98a2dcc2aaa8d275c6e0187270da8a5bab6989d52074dfa9e2d4b5bfb574087a5356a16f232c276e3c6d12fff0d444021abddde89f4ced5871201ae0b768345f83692802d8cbbe3abd02a96c2e3ce55d243ce6958cdaba7d4e9582467c615b896d2304e7605ce951e9b1a0d33f31d522b06f05e2c88a0e99ecb98f0f727694d34888bcac751cabbb6759ad26079bd4c9fff22596933acf0c8f6ce9cad1080d33d284b8c84afbfaecf08ff51ad9dd8eb25a0cfe1834b6db0ad035a7f10f684367b6926eddcb5a7351bdbc202b4371a7fa4df5980b495205e0c435cd813d69554f67c0f04905892d10be3ae97d48410ae257e1eafe79993fbba7c8c97d873d93e8ec6af3abe37a4fc43656dac07eb329492aa3a24085a0b7be8dc83890780138eff0cc04f7b9d2fbd4dd7689771f2184f409e23d1e4e64fa940b954fc1b9df4b0b238d0104728af0bf47fecbbcd150fbe6473c50f4159c3622c2838669fc2917f23a7852235a24999699346772f04c43040d33e95f09346ea682ad5d9d52817e4dd23eca4f6430deb0407c62d49f94a966d87c848afea748a2d1b76b05de2f57f2835e4ca62cd72623bd8470a925027a6f31d4b43fd076914a838ad113fd9844c0191b8a3d3c8000973d9cea470679e201e0554cdc14b87f7b83b0c8c466b518f9711029da0c8b72cf6218fc66d60d13dc96a3805bc6998034c4c4627e81fa221b7f19cf4ba3503fa1686c7cf90e9daf2ee5e65fc21d2f23c145a0949a4a8b1ba5d063a45e77b78a0f975e27b1e1dc720510c2d799e7d0d52848966c0ac31f15b69f88715334012053d9e4e501866f6fe793504d079902bf686e8cc796ddf87f9489140f0b9cf811fd12eaf607347674c35bc44d729829ce8c6b4ee42ce708c6a66abe931c7b20a29b13a59d5e61969398fbb017598c41894fe05b5d2a4cc3f43ccff08f6d56ace1f5b57b238932b38c7c2f69f3d970d74464c93fcaed1a709be79236cc249cc9c88b0c246e1045d2cb052f2f0e52c73b29ed40cc9c6ccd9b4d3a8aacf1b1f8c063d6c520d6d0503b8f18eb96a6bd04cb87f22c4bd3dd7ed340f6614f7bdb57c18680c4b9df3c5c00bc8c187d3204028e5b0fd7005d8c51420565b154c41b1c8070e17d65cbd80be28559ab687eedb08d985e4554df651b371be9d6011bdd2304e193633203b44bcdf16d987a76faec63bcc81c93527c4f2a485c5296fc3071e8d6e5cf395d3659f731aa383b5484ac54a69fc54b7b6e186d66758f60cc0755940eabf2f4c6034e7bfcd08897cce17165c4ae205377472daca1c7260cb499e48cf0d14eac183e7b38ba3b7920e494f98ccfa4794be51fa25aa5c6f4719d4dfe1a7deda920b2cb396d84a91b8b85d568fb605b2869c1b0a1c4109d33e96e629395fb7a59b3913c0176f215b71f27f0693163359e2026a50fb83e1277383cc3943aef35769cf4f8efe94282cb258f5c41f90c1a0b95cddcd4a0d0c5a7a2ba6e94031598acc15753f64343f5bb0e30e8c39bfbf4a2463a329d24ebf669c5428b79334d0a6731cba5723f13b28d666ce276a339a657c5a095ae7dd9708767c62a4b1c052534998c5119ee593e42a259095fa5aa1c9653c397c175ad121dec99dc4c36644dedfcfd5d3a8a727738670aa3d82acc47326eff891264229c5909eaf0e2a1b99e8315650da69d94451763045dac93e56f5e0642e626fadd335f783c819d0b79e28f6f431996271e019b31f43577bc96d93c8d5da9d40003ef57be97f0f60b967400c5b82357355d1c4d5b42faa42ce5dbc5b6ddde0ff5a3c206367c7e9d4b2728b0b1b969588c245d8c6b01bdaae8afb875418a1f797bc0d4b9975a2c161a74083e69a603bf9fa5ffe4a6058199cde06665492e14ef438ddea2bcb039a92762c12579168a7e2c3dc78d10825746f12579564b1f4a88c3258501f931b4a40d23fe6027020c965af9f1fdb96bc8a8a62bdc258215eda31f540a9306cd7599d0971782522bdf7a46cf488a9cca5a69e484a992bd5218945674488854442db8c9be2f8946134b4713c1cb16cff4d764af79d631e581a427fee9e6dc03a376367379b498bb3c9ced6895057eb40ce8e643ab4f2e0add5b86fc9c9d62573959d9766899cdf290ac15d0d09c8724900966cab9b6d7780ce5d008fc8318f1f52787a4fe2477dde55916ba212ce2fadb75fb6cefa064a5c16bb40e4328df19b8ffd818c648d9281cb37d0e14ec503f6cb3278665ac71f02a47d7c03ce9e95308991785384a1a06753f8be15934edcaad196b1c6cf0f14c2e2632ac3ea50fc9e416923626ac164b43ff23cb45f0aa814583adb0172f942e03e6ad77209194b8180fdbbe4ec89d8cd61c20f7151f08c3ff810185d5395dbc94c8f4663d391dcd18438da6eefbeb6e62c447b818f1aee536bad0f26005f529dbb1c920844922dcea4fe379c4ae6fce469b92712d3c99351cf32be09010086c430e028a8aa2f20880591f4a81893c2b6807e5f973d4f46cfb117495cd9af8cd8bb300486d29a6722582bb20694cdc4c75b383645e03e61d5f91bb6d045c2abac41c43e3fd80a51f7c7881754f7f0fb7cf5782c20fde5ac35f30bc7ef1f2d636c1e0b380fd7caaf83062bebe0a76722a23818d24ec7a452c4dbcb5fd50fe00f7e485253fa36f7b5a494a5492452da2aaa586a26709cb1001878eff31eeabed906acd6af4afff87f4bd5b9e21b855994a31b38653671547aa39a1cdcc24a411cb91c55fbed5b7cbc8fda8b87446faa2744702e5222dca5990245f34b3103536fab8eb877d3d1aeae099eac7f4f0d03cf736721cb31271f29ea592e61f45fa2085abe9baf68bb04356aaa6d3b2f82262343bbd44d1d3053fcc62fa3da3e424469e340c6e5a41fc29389ab3db32c546e10c18d2c6c20383f9ab498a3225069b225df0ada27d5b3a17899396153521ad076757a184e8f96c34a1f862bc2cc47d89dd1346541f6f6225941d28a71508bff566d2e7c1942d74913b01a72d6874e1ee7f0ff38a89a7f57c3a43c561a421d8dbf640fb3f565c966a56d044a74442b9c374065984f58fd8e4c8f15fa7b58ac7c40a53e7cb8fe1003ef4b7d4e203de3a55b3920983b33d506850335136f6163eaa96fb2da6b8e3b38268d268c525753836d09a89af23d73d943db6b6856b5f26807ae9ecb6cd6de7ac3064379aef24850e40edd3e93d54b73a1a9e815124e7e38706a1dce0d00594843", 0x1000, 0x913f}, {&(0x7f00000014c0)='8', 0x1, 0x6}, {&(0x7f0000001500)="12c9fcf92a9527bb47", 0xfffffffffffffe39, 0xdc4b}, {&(0x7f0000001540)="0cccdd1f34b1b3660e3eb2cf406c3765968f9932ecfa9e46f348cbf76b5452a194a656a3c0f8beb74c50b17ad4da60098e1e4f94fd7e453df20a591ce74a0018d7119d3202ecdc3e6b6cdbcd796a5412e64228367e89d9e12cbdc0f3276004c93900294ef2cd6f1b5e6cf51c9f6c3426182db892b84c3ea9c33f9adce99b860fe95eb1768b8fc8bf86f576682ec7a405479351f3e702d828cb60ce94e87f417368f1c206d5a286", 0xa7, 0x401}, {&(0x7f0000001880)="2dc574cf0a8eee73f1bcca5e874074cc6eb3854d156ccf5ec599c02695334cdcf3004642750429c5163bc6c4d75d8f9bf28dc018bb687c15d81eb903073939eda2609d262415c7480f6a734a3b151c6ca4b84e9e8f19236d17b4acb60971b75b1b73eda9515cd1dc51676d14c49f0f40c0552b489aa8fed3b19eb60726cab862d9db70a1674def7ce68bf647ccfa8e66599bcc07b7e9d7050c00d878a4b76b9e082b5ee105a8b4dc4069be935dc328071c3b0306b746b733bdb471ad303e4c266fbea942e7e16378d9a715149982764b0baec94b4e35253b47380aa4682ca7f7a0a3a3ffab0b5a5bbda6f74bfb8f6397ee0b237ad3caff2e7d241a4284bb756d93e7745a2d5aa952c19c69f8b2817e9dd07286397c7f6243d880abde243848f4f042012d618096ec4b6be4b852b3c56ffd713a7d840554b60f485f148a2daaf72a", 0x7d, 0x5}], 0x1, &(0x7f0000001780)={[{@ref_verify='ref_verify'}, {@check_int_print_mask={'check_int_print_mask', 0x3d, 0x69d}}, {@discard='discard'}, {@noinode_cache='noinode_cache'}, {@space_cache='space_cache'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'fd'}}, {@pcr={'pcr', 0x3d, 0x2f}}, {@fowner_lt={'fowner<', r1}}]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000001a00)='./file0\x00', 0x2) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000000c0)=0x7f, 0x4) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000001600)=0x1) 21:31:39 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) setpriority(0x0, r0, 0x10000) prctl$PR_CAPBSET_DROP(0x18, 0xc) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0xe24}]}, 0x14, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000002c0)=r0) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) socket(0x1e, 0x800, 0xef) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000780)={0x9, @pix={0x69c4, 0x1f, 0x36335f5e, 0x8, 0x6, 0x7fff, 0x7, 0xb4, 0x1, 0x7, 0x2, 0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 21:31:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x03\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 448.542381] kernel msg: ebtables bug: please report to author: bad policy [ 448.567595] kernel msg: ebtables bug: please report to author: bad policy [ 448.700659] kernel msg: ebtables bug: please report to author: bad policy [ 448.713791] kernel msg: ebtables bug: please report to author: bad policy 21:31:40 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x2fa}], 0x1, 0x0) 21:31:40 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$can_raw(0x1d, 0x3, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)={0x8}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x05\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x300}], 0x1, 0x0) [ 448.895493] FAULT_INJECTION: forcing a failure. [ 448.895493] name failslab, interval 1, probability 0, space 0, times 0 [ 448.913410] kernel msg: ebtables bug: please report to author: bad policy [ 448.957526] kernel msg: ebtables bug: please report to author: bad policy [ 448.974708] CPU: 0 PID: 23952 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 448.982026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.991622] Call Trace: [ 448.994237] dump_stack+0x172/0x1f0 [ 448.997890] should_fail.cold+0xa/0x1b [ 449.001800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 449.006924] ? lock_downgrade+0x810/0x810 [ 449.011090] ? ___might_sleep+0x163/0x280 [ 449.015263] __should_failslab+0x121/0x190 [ 449.019533] should_failslab+0x9/0x14 [ 449.023351] kmem_cache_alloc+0x2b2/0x6f0 [ 449.027527] __alloc_file+0x27/0x300 [ 449.031260] alloc_empty_file+0x72/0x170 [ 449.035371] alloc_file+0x5e/0x4d0 [ 449.038934] alloc_file_pseudo+0x189/0x280 [ 449.043226] ? alloc_file+0x4d0/0x4d0 [ 449.047053] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 449.052619] ? kasan_check_write+0x14/0x20 [ 449.056875] __shmem_file_setup.part.0+0x108/0x2b0 [ 449.061839] shmem_file_setup+0x66/0x90 [ 449.065844] __x64_sys_memfd_create+0x2a2/0x470 [ 449.067785] kernel msg: ebtables bug: please report to author: bad policy [ 449.070539] ? memfd_fcntl+0x1550/0x1550 [ 449.070556] ? do_syscall_64+0x26/0x610 [ 449.070581] ? lockdep_hardirqs_on+0x415/0x5d0 [ 449.070600] ? trace_hardirqs_on+0x67/0x230 [ 449.094476] do_syscall_64+0x103/0x610 [ 449.098396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.103612] RIP: 0033:0x457e29 [ 449.106810] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.125718] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 449.133433] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 449.140706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 449.147978] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 21:31:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x06\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x8, 0x30, 0x10000, 0x9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000001c0)={r4, 0x40}, 0x8) 21:31:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\a\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x2, 0x4, 0x81, 0x101, 0xf, 0x20, 0x33ce13b9, 0x85, 0xe12, 0x4, 0x4d, 0x1}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000180)={{0x4, 0x6, 0xd4, 0x1}, 'syz1\x00', 0x12}) umount2(&(0x7f0000000200)='./file0\x00', 0x4) [ 449.155250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ce31206d4 [ 449.162528] R13: 00000000004c67eb R14: 00000000004dbdb0 R15: 0000000000000004 [ 449.250815] kernel msg: ebtables bug: please report to author: bad policy [ 449.295926] kernel msg: ebtables bug: please report to author: bad policy [ 449.444152] kvm [23970]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 449.464602] kvm [23970]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 449.485268] kvm: pic: non byte read 21:31:40 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_GET_DUMPABLE(0x3) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000180)={0x7, 0x100000000, @raw_data=[0xfffffffffffff54e, 0x1, 0xfff, 0x1, 0x1c, 0x200, 0x5, 0x1000, 0x100000001, 0x3, 0x1000, 0x4, 0x7, 0x1, 0xc00, 0x4]}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x303}], 0x1, 0x0) 21:31:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000040)) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00 \x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:40 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x20, 0x125040) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000080)=[0x3, 0xffffffffffffff90]) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xe5, "5038fe73563ea37210ab05c89f328562314e153a02954da07c4bd1adfd0f17e8a05345e76dd7ec6f652cf947912e40c011dd2b6b5f516694916d0d4b7d52a5b3c9d7502e77ab059f67cd4c86abbef965caefd2b0bcb2c56f51ab5b85840bd31def3565b1e52df51c6df255819640a8cb86dd274c85a670e4663b1087dc51ef91da9a865c70aab502945a945d3485addf92904a0c50dde7214d6722023724264ea65a774172b0acc492cf5c93b2680f3127eea8ffef5944c73f5d4fb0c4faa24842804ad7c9e5d2ca052cd47595a1a943d0843932755416ef075f65ba575f6985fd25252d22"}, &(0x7f0000000280)=0xed) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000002c0)={0x7fff, 0x200, 0x9792, 0x4, r4}, 0x10) [ 449.674149] kernel msg: ebtables bug: please report to author: bad policy [ 449.698550] FAULT_INJECTION: forcing a failure. [ 449.698550] name failslab, interval 1, probability 0, space 0, times 0 [ 449.716750] kernel msg: ebtables bug: please report to author: bad policy 21:31:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00?\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 449.767021] CPU: 1 PID: 23998 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 449.774392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.783764] Call Trace: [ 449.786380] dump_stack+0x172/0x1f0 [ 449.790025] should_fail.cold+0xa/0x1b [ 449.793939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 449.799101] ? lock_downgrade+0x810/0x810 [ 449.803299] ? ___might_sleep+0x163/0x280 [ 449.807472] __should_failslab+0x121/0x190 [ 449.811730] should_failslab+0x9/0x14 [ 449.815555] kmem_cache_alloc+0x2b2/0x6f0 [ 449.819719] ? notify_change+0x6d5/0xfb0 [ 449.823810] ? do_sys_ftruncate+0x41e/0x550 [ 449.828161] getname_flags+0xd6/0x5b0 [ 449.831988] getname+0x1a/0x20 [ 449.835195] do_sys_open+0x2c9/0x5d0 [ 449.838929] ? filp_open+0x80/0x80 [ 449.842486] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 449.847251] ? do_syscall_64+0x26/0x610 [ 449.851256] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.856647] ? do_syscall_64+0x26/0x610 [ 449.860647] __x64_sys_open+0x7e/0xc0 [ 449.864466] do_syscall_64+0x103/0x610 [ 449.868370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.873580] RIP: 0033:0x411f11 [ 449.876782] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 449.895702] RSP: 002b:00007f8ce311fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 449.903430] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 21:31:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x311}], 0x1, 0x0) [ 449.910722] RDX: 00007f8ce311fafa RSI: 0000000000000002 RDI: 00007f8ce311faf0 [ 449.918011] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 449.925310] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 449.932590] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:41 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}]}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:41 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000380)=""/239) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x80000, &(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRESHEX, @ANYRES32=r0, @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYPTR, @ANYRES32, @ANYRES16=0x0, @ANYRES16=r1, @ANYRES32=r0], @ANYRESOCT=r0], @ANYRESHEX=r1, @ANYRES32=r0, @ANYBLOB="d72d249d19e20b934857498cc4d5be81bdec6f887baebac2ec78a040207a560dfa197aa41f1595f44b2f0be68c58bcfaa52a71adc580fe9d7645aa10167c1abfbdeeeedc1ea6f056971b6d9b928f937368066196e6deea40ddc681b73dc2678727ce8416dcd759", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16=r1], @ANYRES16=r1, @ANYRES32=r1, @ANYRES16=r0, @ANYRESOCT, @ANYRES64=r1, @ANYRES64=0x0, @ANYRESOCT=r1], @ANYRES16=0x0, @ANYBLOB="2c00eb035bb8d662863cdbaec7c01b7122b501adb35a46ce64410b86b3"]) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0x80000000, @ipv4={[], [], @multicast1}, 0x1}}, 0x0, 0x6, 0x0, "de1599f8ec4cdf74a000692c1ea11ddbc7fb40e72d6d1bb2a38b7f571fd2e470c34ef2806850fe88c72e923bdc04ccce92f872f12d032710d71181b1599612d0d3d61c1f5ca0e0a3ba1cc0391ca6b4e2"}, 0xd8) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000540)={0xd07, 0x80000000, 0x3, 0x40, 0x80000001, 0xb718}) renameat(r0, &(0x7f0000000640)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00') [ 449.991733] kernel msg: ebtables bug: please report to author: bad policy [ 450.014034] kvm [24007]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 450.029527] kernel msg: ebtables bug: please report to author: bad policy 21:31:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00`\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 450.054856] kvm: pic: non byte read 21:31:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x312}], 0x1, 0x0) 21:31:41 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0500fb6f52e494b1493314d287d786afb62a727e0fb99109acde0d0ee0bc6deb3ac3946cc4bcc920288b41d30a41039c1f3df046fa20a44749f675181c0765bcb38b00d20fe77f33706e86acbee2f3b4952f771692fddf9fa802b01e8ba857cc7aeae6cb"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:41 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x13}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x2d8, r2, 0x212, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc2d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x85a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x596}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9812}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5dd}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x66}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x371}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x34de2b68d0db7c8d}, 0x800) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e22, 0x1, @remote}, {0xa, 0x4e23, 0x3ff, @local}, 0x5, [0x100, 0x95d3, 0x400, 0x5, 0x1, 0x8d0f, 0x51d7, 0x1000]}, 0x5c) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080)={0x19cd, 0x100000, 0x0, 0x2, 0xfe9, 0x80, 0x2, 0x1, 0x4, 0x8}, 0x10) 21:31:41 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xe) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x7f) [ 450.263210] kernel msg: ebtables bug: please report to author: bad policy 21:31:41 executing program 1 (fault-call:2 fault-nth:7): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x31e}], 0x1, 0x0) [ 450.310935] kernel msg: ebtables bug: please report to author: bad policy [ 450.360683] kvm: pic: non byte read 21:31:41 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="e8c897e7b958acabd85c2ff7fb8cfa0b1f3eff19a28475f74fc9802a9df4e4e66de0937ee9f8f9ffea234355e474bba5f125d7131eedf307520e7cc4934b47c23b944a4d9aafcaea5c76a8155c6785e799fe5478254cdd18941173b26faebd39bb36a698b5f4bdca0f14c9", 0x6b, 0xeff}], 0x80000, &(0x7f0000000300)={[{@quota='quota'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'user_id'}}]}) 21:31:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:41 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0xff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x712a}, 0x1c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f7445ea1901820392841e876d6f64653d30303030303030303030303043941beae086a2ecca35f0b87b52a4c0a95c914e56da3793e8902c297e9ae153e1fd25d303e1114f802cf0de0f689c95e927452d45ca72f9f2c4fc223a30903e26091e29045ea0690e35e0ac6c98da6b23287edffdf0974c63551f75bb62df2871cacd9e240236d6ef2a5de77ce48863df04b8ad384e01a3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(r0, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) umount2(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 450.389920] kvm: pic: non byte read [ 450.393655] kvm: pic: non byte read [ 450.482878] FAULT_INJECTION: forcing a failure. [ 450.482878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 450.494726] CPU: 1 PID: 24055 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 450.494737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.494743] Call Trace: [ 450.494770] dump_stack+0x172/0x1f0 [ 450.494794] should_fail.cold+0xa/0x1b [ 450.494815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 450.494837] ? mark_held_locks+0x100/0x100 [ 450.526634] should_fail_alloc_page+0x50/0x60 [ 450.526656] __alloc_pages_nodemask+0x1a1/0x710 [ 450.540095] ? __alloc_pages_slowpath+0x2900/0x2900 [ 450.545131] ? find_held_lock+0x35/0x130 [ 450.549224] cache_grow_begin+0x9c/0x8c0 [ 450.553315] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 450.558874] ? check_preemption_disabled+0x48/0x290 [ 450.563917] kmem_cache_alloc+0x62d/0x6f0 [ 450.568090] ? notify_change+0x6d5/0xfb0 [ 450.572162] ? do_sys_ftruncate+0x41e/0x550 [ 450.576499] getname_flags+0xd6/0x5b0 [ 450.580324] getname+0x1a/0x20 [ 450.583527] do_sys_open+0x2c9/0x5d0 [ 450.587253] ? filp_open+0x80/0x80 [ 450.590811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 450.595581] ? do_syscall_64+0x26/0x610 [ 450.599564] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.604935] ? do_syscall_64+0x26/0x610 [ 450.608921] __x64_sys_open+0x7e/0xc0 [ 450.612733] do_syscall_64+0x103/0x610 [ 450.616635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.621826] RIP: 0033:0x411f11 [ 450.625025] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 450.643932] RSP: 002b:00007f8ce311fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 450.651649] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 450.658921] RDX: 00007f8ce311fafa RSI: 0000000000000002 RDI: 00007f8ce311faf0 [ 450.666192] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 450.673462] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 21:31:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x31f}], 0x1, 0x0) [ 450.680758] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 450.696264] kernel msg: ebtables bug: please report to author: bad policy [ 450.713135] kernel msg: ebtables bug: please report to author: bad policy 21:31:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00U\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:42 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x2000, 0x0) write$FUSE_WRITE(r0, &(0x7f00000001c0)={0x18, 0x0, 0x6, {0xffffffff}}, 0x18) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x8, {0x0, 0x3}}, 0x20) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 21:31:42 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) connect$x25(r0, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendto$x25(r0, 0x0, 0x0, 0x1, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) 21:31:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x320}], 0x1, 0x0) [ 450.843408] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 450.868970] kernel msg: ebtables bug: please report to author: bad policy [ 450.927516] kernel msg: ebtables bug: please report to author: bad policy 21:31:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:42 executing program 1 (fault-call:2 fault-nth:8): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x325}], 0x1, 0x0) 21:31:42 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) write$P9_RSTATu(r1, 0x0, 0x0) mknod(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 21:31:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00c\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x02\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 451.111124] kernel msg: ebtables bug: please report to author: bad policy [ 451.123123] kernel msg: ebtables bug: please report to author: bad policy 21:31:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x328}], 0x1, 0x0) [ 451.231179] *** Guest State *** [ 451.236663] XFS (loop2): Invalid superblock magic number [ 451.244331] net_ratelimit: 24 callbacks suppressed [ 451.244341] protocol 88fb is buggy, dev hsr_slave_0 [ 451.249728] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 451.254431] protocol 88fb is buggy, dev hsr_slave_1 21:31:42 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) connect$x25(r0, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 451.274509] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 451.290401] FAULT_INJECTION: forcing a failure. [ 451.290401] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 451.302219] CPU: 1 PID: 24113 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 451.308376] kernel msg: ebtables bug: please report to author: bad policy [ 451.309497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.309505] Call Trace: [ 451.309531] dump_stack+0x172/0x1f0 [ 451.309560] should_fail.cold+0xa/0x1b [ 451.323498] kernel msg: ebtables bug: please report to author: bad policy [ 451.325844] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 451.325867] ? mark_held_locks+0x100/0x100 [ 451.325887] should_fail_alloc_page+0x50/0x60 [ 451.325903] __alloc_pages_nodemask+0x1a1/0x710 [ 451.325924] ? __alloc_pages_slowpath+0x2900/0x2900 [ 451.325937] ? find_held_lock+0x35/0x130 [ 451.325969] cache_grow_begin+0x9c/0x8c0 [ 451.325985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 451.326000] ? check_preemption_disabled+0x48/0x290 [ 451.326019] kmem_cache_alloc+0x62d/0x6f0 [ 451.326032] ? notify_change+0x6d5/0xfb0 [ 451.326046] ? do_sys_ftruncate+0x41e/0x550 [ 451.326071] getname_flags+0xd6/0x5b0 [ 451.326102] getname+0x1a/0x20 [ 451.326117] do_sys_open+0x2c9/0x5d0 [ 451.326134] ? filp_open+0x80/0x80 [ 451.326152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 451.326170] ? do_syscall_64+0x26/0x610 [ 451.420802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.426171] ? do_syscall_64+0x26/0x610 [ 451.430161] __x64_sys_open+0x7e/0xc0 [ 451.433979] do_syscall_64+0x103/0x610 [ 451.437874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.443068] RIP: 0033:0x411f11 [ 451.446270] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 451.465192] RSP: 002b:00007f8ce311fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 451.472910] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 21:31:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x03\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 451.480190] RDX: 00007f8ce311fafa RSI: 0000000000000002 RDI: 00007f8ce311faf0 [ 451.484366] protocol 88fb is buggy, dev hsr_slave_0 [ 451.487459] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 451.487471] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 451.492556] protocol 88fb is buggy, dev hsr_slave_1 [ 451.499749] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 451.522246] CR3 = 0x0000000000000000 [ 451.529700] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 451.536463] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 451.567938] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 451.591160] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 451.606331] kernel msg: ebtables bug: please report to author: bad policy [ 451.613984] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 451.626366] kernel msg: ebtables bug: please report to author: bad policy 21:31:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x04\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:31:42 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000140)={{}, [@rose, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x300}, @null, @netrom, @bcast, @null]}, 0x48) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{0x3, @null, 0x4}, [@null, @bcast, @default, @netrom, @rose, @remote, @default, @bcast]}, 0x48) [ 451.634380] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 451.643351] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 451.651952] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 451.661039] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 451.669800] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 451.702628] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 451.711360] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 451.719683] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 451.741834] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 451.757414] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de [ 451.767651] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 451.774410] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 451.783638] kernel msg: ebtables bug: please report to author: bad policy [ 451.792212] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de [ 451.800748] Interruptibility = 00000000 ActivityState = 00000000 [ 451.807162] protocol 88fb is buggy, dev hsr_slave_0 [ 451.807214] protocol 88fb is buggy, dev hsr_slave_1 [ 451.819672] kernel msg: ebtables bug: please report to author: bad policy [ 451.819836] *** Host State *** [ 451.836229] RIP = 0xffffffff811b36f0 RSP = 0xffff88804ce8f8b8 [ 451.842372] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 451.868587] FSBase=00007fb949cce700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 451.883782] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 451.900509] CR0=0000000080050033 CR3=000000009faf0000 CR4=00000000001426f0 [ 451.914490] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87201360 [ 451.921178] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 451.927609] *** Control State *** [ 451.931080] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000cb [ 451.938066] EntryControls=0000d1ff ExitControls=002fefff [ 451.943543] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 451.950838] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 451.957806] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 451.964314] protocol 88fb is buggy, dev hsr_slave_0 [ 451.964684] reason=80000021 qualification=0000000000000000 [ 451.969453] protocol 88fb is buggy, dev hsr_slave_1 [ 451.976028] IDTVectoring: info=00000000 errcode=00000000 [ 451.994607] TSC Offset = 0xffffff0bcb2f4053 [ 451.999956] TPR Threshold = 0x00 [ 452.003433] EPT pointer = 0x000000009ece701e [ 452.012198] *** Guest State *** [ 452.018686] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 452.030724] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 452.064333] CR3 = 0x0000000000000000 [ 452.068491] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 452.094277] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 452.100299] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 452.107338] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 452.115714] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 452.123703] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 452.131793] protocol 88fb is buggy, dev hsr_slave_0 [ 452.131847] protocol 88fb is buggy, dev hsr_slave_1 [ 452.142894] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 452.151208] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 452.160464] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 452.168748] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 452.177016] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 452.185329] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 452.193508] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 452.201946] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 452.208655] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 452.216412] Interruptibility = 00000000 ActivityState = 00000000 [ 452.222645] *** Host State *** [ 452.226150] RIP = 0xffffffff811b36f0 RSP = 0xffff8880573778b8 [ 452.232150] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 452.238856] FSBase=00007fb949c6a700 GSBase=ffff8880ae800000 TRBase=fffffe0000033000 [ 452.246961] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 452.252867] CR0=0000000080050033 CR3=000000009faf0000 CR4=00000000001426f0 [ 452.260198] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87201360 [ 452.268615] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 452.278881] *** Control State *** [ 452.282463] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000cb [ 452.291627] EntryControls=0000d1ff ExitControls=002fefff [ 452.301215] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 452.310314] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 452.321080] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 452.329787] reason=80000021 qualification=0000000000000000 [ 452.340207] IDTVectoring: info=00000000 errcode=00000000 [ 452.347814] TSC Offset = 0xffffff0bcb2f4053 [ 452.352238] TPR Threshold = 0x00 [ 452.359814] EPT pointer = 0x000000009ece701e 21:31:43 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) r1 = socket$isdn(0x22, 0x3, 0x22) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000180)={r1, 0x8, 0x8, "faff6e288beb179af9e413b5138c94d525fcce6b9c4eb6cf8e907fd8a836baafadc1897521f11fd31d133320f4f833048833e093a15eb9ae76ac813fe335ea7e92cf48d700a06f9b1e0022b320c2bc26937044c93fcf1533bd160b3f0dacf411481bd31885acacaeae81956968ae619307e96d85363f8e93f5a775fae301c7ed0df5d59fe8f7cf65e1e31519eadc9b1e2ef9c1391cdad2cc9e796ee1b9c1e867b2409ffd363e8a77fb07add76f0575b8a89ea5ba812895e768258889808f17930a5671bfc843bb5dda8a0784c0ed1f08cacd340e1bbdf29ed353da390dff3dda39974d70489c0acadd3536635da35f4233691292eb9a6405b6"}) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:31:43 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 21:31:43 executing program 1 (fault-call:2 fault-nth:9): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x32f}], 0x1, 0x0) 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x05\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x06\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 452.468950] kernel msg: ebtables bug: please report to author: bad policy [ 452.482140] FAULT_INJECTION: forcing a failure. [ 452.482140] name failslab, interval 1, probability 0, space 0, times 0 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 452.521089] CPU: 1 PID: 24156 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 452.528417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.537786] Call Trace: [ 452.540401] dump_stack+0x172/0x1f0 [ 452.544051] should_fail.cold+0xa/0x1b [ 452.547962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 452.553083] ? lock_downgrade+0x810/0x810 [ 452.557252] ? ___might_sleep+0x163/0x280 [ 452.561437] __should_failslab+0x121/0x190 [ 452.565691] should_failslab+0x9/0x14 21:31:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7f, 0x100) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) chmod(&(0x7f0000000180)='./file0\x00', 0x14c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) creat(&(0x7f0000000040)='./file0\x00', 0x1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 452.569501] kmem_cache_alloc+0x2b2/0x6f0 [ 452.573672] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 452.579135] ? __alloc_file+0x27/0x300 [ 452.583042] ? rcu_read_lock_sched_held+0x110/0x130 [ 452.588087] selinux_file_alloc_security+0xb4/0x190 [ 452.593127] security_file_alloc+0x69/0xb0 [ 452.597384] __alloc_file+0xac/0x300 [ 452.601118] alloc_empty_file+0x72/0x170 [ 452.605195] path_openat+0xef/0x4690 [ 452.608925] ? __lock_acquire+0x53b/0x4700 [ 452.613171] ? getname+0x1a/0x20 [ 452.616549] ? do_sys_open+0x2c9/0x5d0 [ 452.620444] ? __x64_sys_open+0x7e/0xc0 [ 452.624435] ? do_syscall_64+0x103/0x610 [ 452.628510] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.633896] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 452.638579] ? __lock_is_held+0xb6/0x140 [ 452.642664] ? __alloc_fd+0x430/0x530 [ 452.646487] do_filp_open+0x1a1/0x280 [ 452.650311] ? may_open_dev+0x100/0x100 [ 452.654310] ? lock_downgrade+0x810/0x810 [ 452.658488] ? kasan_check_read+0x11/0x20 [ 452.662640] ? do_raw_spin_unlock+0x57/0x270 [ 452.667055] ? _raw_spin_unlock+0x2d/0x50 [ 452.671213] ? __alloc_fd+0x430/0x530 [ 452.675029] do_sys_open+0x3fe/0x5d0 [ 452.678749] ? filp_open+0x80/0x80 [ 452.682306] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 452.687070] ? do_syscall_64+0x26/0x610 [ 452.691055] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.696431] ? do_syscall_64+0x26/0x610 [ 452.700418] __x64_sys_open+0x7e/0xc0 [ 452.704227] do_syscall_64+0x103/0x610 [ 452.708127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.713322] RIP: 0033:0x411f11 [ 452.716522] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 452.735423] RSP: 002b:00007f8ce311fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 452.743131] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 452.750401] RDX: 00007f8ce311fafa RSI: 0000000000000002 RDI: 00007f8ce311faf0 [ 452.757670] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 452.764937] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 21:31:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x335}], 0x1, 0x0) 21:31:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\a\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 452.772207] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 452.804536] kernel msg: ebtables bug: please report to author: bad policy 21:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:44 executing program 1 (fault-call:2 fault-nth:10): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 452.943938] kernel msg: ebtables bug: please report to author: bad policy [ 452.960171] kernel msg: ebtables bug: please report to author: bad policy [ 453.044987] FAULT_INJECTION: forcing a failure. [ 453.044987] name failslab, interval 1, probability 0, space 0, times 0 [ 453.056380] CPU: 0 PID: 24181 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 453.063681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.073037] Call Trace: [ 453.075642] dump_stack+0x172/0x1f0 [ 453.079302] should_fail.cold+0xa/0x1b [ 453.083212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 453.088335] ? lock_downgrade+0x810/0x810 [ 453.092499] ? ___might_sleep+0x163/0x280 [ 453.096709] __should_failslab+0x121/0x190 [ 453.100974] should_failslab+0x9/0x14 [ 453.104784] kmem_cache_alloc+0x2b2/0x6f0 [ 453.108948] ? __schedule+0x1387/0x1cc0 [ 453.112943] __kernfs_new_node+0xef/0x690 [ 453.117103] ? _raw_spin_unlock_irq+0x28/0x90 [ 453.121617] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 453.126396] ? __lock_acquire+0x53b/0x4700 [ 453.130642] ? _raw_spin_unlock_irq+0x5e/0x90 [ 453.135156] ? __schedule+0x1387/0x1cc0 [ 453.139159] kernfs_new_node+0x99/0x130 [ 453.143150] kernfs_create_dir_ns+0x52/0x160 [ 453.147660] internal_create_group+0x7f8/0xc40 [ 453.152254] ? bd_set_size+0x89/0xb0 [ 453.156003] ? remove_files.isra.0+0x190/0x190 [ 453.160618] sysfs_create_group+0x20/0x30 [ 453.164822] lo_ioctl+0xf8f/0x20d0 [ 453.168388] ? lo_rw_aio+0x1530/0x1530 [ 453.172360] blkdev_ioctl+0xee8/0x1c40 [ 453.176269] ? blkpg_ioctl+0xa90/0xa90 [ 453.180175] ? find_held_lock+0x35/0x130 [ 453.184255] ? debug_check_no_obj_freed+0x200/0x464 [ 453.189320] ? __fget+0x340/0x540 [ 453.192796] ? ___might_sleep+0x163/0x280 [ 453.196958] block_ioctl+0xee/0x130 [ 453.200621] ? blkdev_fallocate+0x410/0x410 [ 453.204956] do_vfs_ioctl+0xd6e/0x1390 [ 453.208858] ? selinux_file_ioctl+0x46f/0x5e0 [ 453.213370] ? selinux_file_ioctl+0x125/0x5e0 [ 453.217881] ? ioctl_preallocate+0x210/0x210 [ 453.222315] ? selinux_file_mprotect+0x620/0x620 [ 453.227092] ? iterate_fd+0x360/0x360 [ 453.230913] ? do_sys_open+0x31d/0x5d0 [ 453.234819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.240372] ? security_file_ioctl+0x93/0xc0 [ 453.244797] ksys_ioctl+0xab/0xd0 [ 453.248266] __x64_sys_ioctl+0x73/0xb0 [ 453.252185] do_syscall_64+0x103/0x610 [ 453.256093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.261326] RIP: 0033:0x457c97 [ 453.264531] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.283453] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:31:44 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) faccessat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x103, 0x100) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socket$netlink(0x10, 0x3, 0xe) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000) tkill(r3, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, 0x0) 21:31:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x33c}], 0x1, 0x0) 21:31:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00`\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 453.291188] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 453.298472] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 453.305757] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 453.313043] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 453.320323] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 453.385154] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 453.416771] kernel msg: ebtables bug: please report to author: bad policy 21:31:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x345}], 0x1, 0x0) [ 453.467452] kernel msg: ebtables bug: please report to author: bad policy 21:31:44 executing program 1 (fault-call:2 fault-nth:11): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000080)="640fc7af00000f32f792f4fff426363e36f3a50f32ea00008a00b83a010f00d866b80e0000000f23c00f21f8663502000d000f23f8360f73d300", 0x3a}], 0x1, 0x1, &(0x7f00000001c0)=[@dstype0={0x6, 0xb}, @flags={0x3, 0x4}], 0x2) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x9) 21:31:44 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x03\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x348}], 0x1, 0x0) 21:31:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 453.672683] FAULT_INJECTION: forcing a failure. [ 453.672683] name failslab, interval 1, probability 0, space 0, times 0 [ 453.712705] kernel msg: ebtables bug: please report to author: bad policy [ 453.721338] CPU: 1 PID: 24213 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 453.728647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.738019] Call Trace: [ 453.740626] dump_stack+0x172/0x1f0 [ 453.744266] should_fail.cold+0xa/0x1b [ 453.748179] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 453.753298] ? lock_downgrade+0x810/0x810 [ 453.757492] ? ___might_sleep+0x163/0x280 [ 453.761656] __should_failslab+0x121/0x190 [ 453.765927] should_failslab+0x9/0x14 [ 453.769734] kmem_cache_alloc+0x2b2/0x6f0 [ 453.773962] ? cpuacct_charge+0x1db/0x360 [ 453.778121] ? find_held_lock+0x35/0x130 [ 453.782197] __kernfs_new_node+0xef/0x690 [ 453.786362] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 453.791137] ? __lock_acquire+0x53b/0x4700 [ 453.795399] kernfs_new_node+0x99/0x130 [ 453.799387] kernfs_create_dir_ns+0x52/0x160 [ 453.803808] internal_create_group+0x7f8/0xc40 [ 453.808414] ? bd_set_size+0x89/0xb0 [ 453.812155] ? remove_files.isra.0+0x190/0x190 [ 453.816756] sysfs_create_group+0x20/0x30 [ 453.820924] lo_ioctl+0xf8f/0x20d0 [ 453.824474] ? lo_rw_aio+0x1530/0x1530 [ 453.828378] blkdev_ioctl+0xee8/0x1c40 [ 453.832279] ? blkpg_ioctl+0xa90/0xa90 [ 453.836186] ? find_held_lock+0x35/0x130 [ 453.840263] ? debug_check_no_obj_freed+0x200/0x464 [ 453.845303] ? __fget+0x340/0x540 [ 453.848773] ? ___might_sleep+0x163/0x280 [ 453.852934] block_ioctl+0xee/0x130 [ 453.856564] ? blkdev_fallocate+0x410/0x410 [ 453.860924] do_vfs_ioctl+0xd6e/0x1390 [ 453.864835] ? selinux_file_ioctl+0x46f/0x5e0 [ 453.869351] ? selinux_file_ioctl+0x125/0x5e0 [ 453.873854] ? ioctl_preallocate+0x210/0x210 [ 453.878270] ? selinux_file_mprotect+0x620/0x620 [ 453.883050] ? iterate_fd+0x360/0x360 [ 453.886862] ? do_sys_open+0x31d/0x5d0 [ 453.890765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.896316] ? security_file_ioctl+0x93/0xc0 [ 453.900753] ksys_ioctl+0xab/0xd0 [ 453.904249] __x64_sys_ioctl+0x73/0xb0 [ 453.908160] do_syscall_64+0x103/0x610 [ 453.912054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.917252] RIP: 0033:0x457c97 [ 453.920464] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.939375] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.947126] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 453.954402] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 453.961680] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 21:31:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x05\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 453.968954] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 453.976234] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 454.060341] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 454.075395] kernel msg: ebtables bug: please report to author: bad policy [ 456.284329] net_ratelimit: 22 callbacks suppressed [ 456.284338] protocol 88fb is buggy, dev hsr_slave_0 [ 456.294430] protocol 88fb is buggy, dev hsr_slave_1 21:31:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) exit_group(0x0) ioprio_set$pid(0x2, 0x0, 0x0) 21:31:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x34c}], 0x1, 0x0) 21:31:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x06\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:47 executing program 1 (fault-call:2 fault-nth:12): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x101080, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000180)={0x3, 0x3, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x4000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 456.452944] kernel msg: ebtables bug: please report to author: bad policy [ 456.477863] FAULT_INJECTION: forcing a failure. [ 456.477863] name failslab, interval 1, probability 0, space 0, times 0 [ 456.489528] CPU: 0 PID: 24244 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 456.496817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.498115] kernel msg: ebtables bug: please report to author: bad policy [ 456.506173] Call Trace: [ 456.506269] dump_stack+0x172/0x1f0 [ 456.506311] should_fail.cold+0xa/0x1b [ 456.523326] ? kernel_text_address+0x73/0xf0 [ 456.527755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 456.532871] ? __lock_is_held+0xb6/0x140 [ 456.536946] ? check_preemption_disabled+0x48/0x290 [ 456.541982] __should_failslab+0x121/0x190 [ 456.546238] should_failslab+0x9/0x14 [ 456.550040] kmem_cache_alloc+0x47/0x6f0 [ 456.554107] ? save_stack+0xa9/0xd0 [ 456.557742] ? save_stack+0x45/0xd0 [ 456.561371] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 456.566482] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 456.572117] idr_get_free+0x425/0x8d0 [ 456.575937] idr_alloc_u32+0x19e/0x330 [ 456.579832] ? __fprop_inc_percpu_max+0x230/0x230 [ 456.584686] ? __lock_is_held+0xb6/0x140 [ 456.588749] ? check_preemption_disabled+0x48/0x290 [ 456.593774] idr_alloc_cyclic+0x132/0x270 [ 456.597932] ? idr_alloc+0x150/0x150 [ 456.601659] __kernfs_new_node+0x171/0x690 [ 456.605903] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 456.610670] ? __lock_acquire+0x53b/0x4700 [ 456.614927] kernfs_new_node+0x99/0x130 [ 456.618914] kernfs_create_dir_ns+0x52/0x160 [ 456.623341] internal_create_group+0x7f8/0xc40 [ 456.627930] ? bd_set_size+0x89/0xb0 [ 456.631660] ? remove_files.isra.0+0x190/0x190 [ 456.636257] sysfs_create_group+0x20/0x30 [ 456.640424] lo_ioctl+0xf8f/0x20d0 [ 456.643976] ? lo_rw_aio+0x1530/0x1530 [ 456.647873] blkdev_ioctl+0xee8/0x1c40 [ 456.651765] ? blkpg_ioctl+0xa90/0xa90 [ 456.655657] ? find_held_lock+0x35/0x130 [ 456.659723] ? debug_check_no_obj_freed+0x200/0x464 [ 456.664749] ? __fget+0x340/0x540 [ 456.668209] ? ___might_sleep+0x163/0x280 [ 456.672364] block_ioctl+0xee/0x130 [ 456.675992] ? blkdev_fallocate+0x410/0x410 [ 456.680326] do_vfs_ioctl+0xd6e/0x1390 [ 456.684220] ? selinux_file_ioctl+0x46f/0x5e0 [ 456.688731] ? selinux_file_ioctl+0x125/0x5e0 [ 456.693233] ? ioctl_preallocate+0x210/0x210 [ 456.697654] ? selinux_file_mprotect+0x620/0x620 [ 456.702424] ? iterate_fd+0x360/0x360 [ 456.706234] ? do_sys_open+0x31d/0x5d0 [ 456.710141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.715686] ? security_file_ioctl+0x93/0xc0 [ 456.720103] ksys_ioctl+0xab/0xd0 [ 456.723578] __x64_sys_ioctl+0x73/0xb0 [ 456.727480] do_syscall_64+0x103/0x610 [ 456.731381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.736577] RIP: 0033:0x457c97 21:31:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\a\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 456.739771] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.758673] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.766390] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 456.773660] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 456.780930] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 456.788222] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 456.795491] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x34d}], 0x1, 0x0) 21:31:48 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 456.907934] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:48 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00 \x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x351}], 0x1, 0x0) [ 456.972659] kernel msg: ebtables bug: please report to author: bad policy [ 457.004307] protocol 88fb is buggy, dev hsr_slave_0 [ 457.009463] protocol 88fb is buggy, dev hsr_slave_1 [ 457.142001] kernel msg: ebtables bug: please report to author: bad policy [ 457.227462] kvm_hv_set_msr: 8 callbacks suppressed [ 457.227480] kvm [24243]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 457.277415] kvm [24243]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 457.310133] kvm [24243]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 457.484346] protocol 88fb is buggy, dev hsr_slave_0 [ 457.489463] protocol 88fb is buggy, dev hsr_slave_1 21:31:48 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) connect$x25(r0, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) sendto$x25(r0, 0x0, 0x0, 0x1, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x11) 21:31:48 executing program 1 (fault-call:2 fault-nth:13): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:48 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x354}], 0x1, 0x0) 21:31:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00?\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) [ 457.706674] FAULT_INJECTION: forcing a failure. [ 457.706674] name failslab, interval 1, probability 0, space 0, times 0 [ 457.708749] kernel msg: ebtables bug: please report to author: bad policy [ 457.718038] CPU: 0 PID: 24391 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 457.732235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.741610] Call Trace: [ 457.744216] dump_stack+0x172/0x1f0 [ 457.747872] should_fail.cold+0xa/0x1b [ 457.751776] ? kernel_text_address+0x73/0xf0 [ 457.756202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 457.761325] ? __lock_is_held+0xb6/0x140 [ 457.765397] ? check_preemption_disabled+0x48/0x290 [ 457.770433] __should_failslab+0x121/0x190 [ 457.774682] should_failslab+0x9/0x14 [ 457.778489] kmem_cache_alloc+0x47/0x6f0 [ 457.782563] ? save_stack+0xa9/0xd0 [ 457.786207] ? save_stack+0x45/0xd0 [ 457.789837] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 457.794959] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 457.800601] idr_get_free+0x425/0x8d0 [ 457.804429] idr_alloc_u32+0x19e/0x330 [ 457.808332] ? __fprop_inc_percpu_max+0x230/0x230 [ 457.813184] ? __lock_is_held+0xb6/0x140 [ 457.817257] ? check_preemption_disabled+0x48/0x290 [ 457.822312] idr_alloc_cyclic+0x132/0x270 [ 457.826479] ? idr_alloc+0x150/0x150 [ 457.830215] __kernfs_new_node+0x171/0x690 [ 457.834463] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 457.839230] ? __lock_acquire+0x53b/0x4700 [ 457.843496] ? _raw_spin_unlock_irq+0x5e/0x90 [ 457.848025] ? __schedule+0x1387/0x1cc0 [ 457.852019] kernfs_new_node+0x99/0x130 [ 457.856003] kernfs_create_dir_ns+0x52/0x160 [ 457.860422] internal_create_group+0x7f8/0xc40 [ 457.865012] ? bd_set_size+0x89/0xb0 [ 457.868744] ? remove_files.isra.0+0x190/0x190 [ 457.873348] sysfs_create_group+0x20/0x30 [ 457.877507] lo_ioctl+0xf8f/0x20d0 [ 457.881064] ? lo_rw_aio+0x1530/0x1530 [ 457.885131] blkdev_ioctl+0xee8/0x1c40 [ 457.889028] ? blkpg_ioctl+0xa90/0xa90 [ 457.892922] ? find_held_lock+0x35/0x130 [ 457.896990] ? debug_check_no_obj_freed+0x200/0x464 [ 457.902019] ? __fget+0x340/0x540 [ 457.905481] ? ___might_sleep+0x163/0x280 [ 457.909641] block_ioctl+0xee/0x130 [ 457.913270] ? blkdev_fallocate+0x410/0x410 [ 457.917610] do_vfs_ioctl+0xd6e/0x1390 [ 457.921504] ? selinux_file_ioctl+0x46f/0x5e0 [ 457.926009] ? selinux_file_ioctl+0x125/0x5e0 [ 457.930512] ? ioctl_preallocate+0x210/0x210 [ 457.934928] ? selinux_file_mprotect+0x620/0x620 [ 457.939698] ? iterate_fd+0x360/0x360 [ 457.943512] ? do_sys_open+0x31d/0x5d0 [ 457.947413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.953071] ? security_file_ioctl+0x93/0xc0 [ 457.957493] ksys_ioctl+0xab/0xd0 [ 457.960967] __x64_sys_ioctl+0x73/0xb0 [ 457.964874] do_syscall_64+0x103/0x610 [ 457.968783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.973982] RIP: 0033:0x457c97 [ 457.977182] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 457.996094] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 458.003820] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 458.011102] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 458.018475] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 458.025757] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 458.033051] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 458.040538] protocol 88fb is buggy, dev hsr_slave_0 [ 458.045767] protocol 88fb is buggy, dev hsr_slave_1 [ 458.050979] protocol 88fb is buggy, dev hsr_slave_0 21:31:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 458.056130] protocol 88fb is buggy, dev hsr_slave_1 21:31:49 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000), 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) read(r0, &(0x7f0000000100)=""/4096, 0x1000) clock_settime(0x0, &(0x7f0000000040)={r1}) [ 458.081616] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x355}], 0x1, 0x0) 21:31:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00`\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="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") r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x8, 0x10000, 0x6, 0xffffffff, 0x1, 0x505e, 0x2, 0x2}, &(0x7f0000000080)={0xbeb, 0x6ce16ebd, 0x2, 0x4, 0x9, 0x7fffffff, 0x7ff, 0x10001}, &(0x7f0000000280)={0x2, 0x100, 0x6, 0x1, 0x9, 0x4, 0x1051, 0x5}, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000340)={&(0x7f0000000300)={0x4}, 0x8}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:49 executing program 1 (fault-call:2 fault-nth:14): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:49 executing program 0: perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) [ 458.285936] kernel msg: ebtables bug: please report to author: bad policy 21:31:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x362}], 0x1, 0x0) 21:31:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 458.372367] FAULT_INJECTION: forcing a failure. [ 458.372367] name failslab, interval 1, probability 0, space 0, times 0 [ 458.437895] CPU: 0 PID: 24543 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 458.445228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.454601] Call Trace: [ 458.457216] dump_stack+0x172/0x1f0 [ 458.460867] should_fail.cold+0xa/0x1b [ 458.464780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 458.469900] ? lock_downgrade+0x810/0x810 [ 458.474066] ? ___might_sleep+0x163/0x280 [ 458.478241] __should_failslab+0x121/0x190 [ 458.482490] should_failslab+0x9/0x14 [ 458.486312] kmem_cache_alloc+0x2b2/0x6f0 [ 458.490476] ? lock_downgrade+0x810/0x810 [ 458.494640] ? kasan_check_read+0x11/0x20 [ 458.498809] __kernfs_new_node+0xef/0x690 [ 458.503006] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 458.507780] ? wait_for_completion+0x440/0x440 [ 458.512383] ? mutex_unlock+0xd/0x10 [ 458.516106] ? kernfs_activate+0x192/0x1f0 [ 458.520357] kernfs_new_node+0x99/0x130 [ 458.524352] __kernfs_create_file+0x51/0x340 [ 458.528778] sysfs_add_file_mode_ns+0x222/0x560 [ 458.533469] internal_create_group+0x35b/0xc40 [ 458.538064] ? bd_set_size+0x89/0xb0 [ 458.541803] ? remove_files.isra.0+0x190/0x190 [ 458.546416] sysfs_create_group+0x20/0x30 [ 458.550586] lo_ioctl+0xf8f/0x20d0 [ 458.554145] ? lo_rw_aio+0x1530/0x1530 [ 458.558051] blkdev_ioctl+0xee8/0x1c40 [ 458.561949] ? blkpg_ioctl+0xa90/0xa90 [ 458.565852] ? find_held_lock+0x35/0x130 [ 458.569925] ? debug_check_no_obj_freed+0x200/0x464 [ 458.574959] ? __fget+0x340/0x540 [ 458.578429] ? ___might_sleep+0x163/0x280 [ 458.582598] block_ioctl+0xee/0x130 [ 458.586236] ? blkdev_fallocate+0x410/0x410 [ 458.590578] do_vfs_ioctl+0xd6e/0x1390 [ 458.594479] ? selinux_file_ioctl+0x46f/0x5e0 [ 458.598985] ? selinux_file_ioctl+0x125/0x5e0 [ 458.603497] ? ioctl_preallocate+0x210/0x210 [ 458.607914] ? selinux_file_mprotect+0x620/0x620 [ 458.612692] ? iterate_fd+0x360/0x360 [ 458.616504] ? do_sys_open+0x31d/0x5d0 [ 458.620408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.625960] ? security_file_ioctl+0x93/0xc0 [ 458.630384] ksys_ioctl+0xab/0xd0 [ 458.633851] __x64_sys_ioctl+0x73/0xb0 [ 458.637752] do_syscall_64+0x103/0x610 [ 458.641668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.646863] RIP: 0033:0x457c97 [ 458.650065] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.669152] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 458.676882] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 21:31:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x02\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 458.684177] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 458.691454] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 458.698734] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 458.706013] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 458.855089] kernel msg: ebtables bug: please report to author: bad policy [ 458.884949] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400, 0x0) sendto$inet(r3, &(0x7f0000000240)="f5ab6356b20ce65cba49c3bd57d7c623737f021f83e78355e09b9748e2f2eca770861601b1198e172e6dcf5ae42cee78916fc8f944c420dd2a482207076727ab7a2440d8e2da8ae2caec17f73cb4710c8608b1f5fd4f6b8c1a4cccbc2c34e6c638cefe28d7092ae9a5a6c491a208d27d126f7243ebbacf7d1dbe8f08b5ae1ea71fd3fbddd54f97e6b71a8b", 0x8b, 0x10, &(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10) sendfile(r0, r0, &(0x7f0000000080), 0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:49 executing program 0: perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) 21:31:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x363}], 0x1, 0x0) 21:31:49 executing program 1 (fault-call:2 fault-nth:15): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x03\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x364}], 0x1, 0x0) [ 459.153930] kernel msg: ebtables bug: please report to author: bad policy [ 459.156726] kvm [24725]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 459.184754] FAULT_INJECTION: forcing a failure. [ 459.184754] name failslab, interval 1, probability 0, space 0, times 0 21:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 459.230080] kvm [24725]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 459.278272] CPU: 0 PID: 24753 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 459.285617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.294984] Call Trace: [ 459.297604] dump_stack+0x172/0x1f0 [ 459.301275] should_fail.cold+0xa/0x1b [ 459.305201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 459.310330] ? lock_downgrade+0x810/0x810 [ 459.314490] ? ___might_sleep+0x163/0x280 [ 459.318660] __should_failslab+0x121/0x190 [ 459.322903] should_failslab+0x9/0x14 [ 459.326713] kmem_cache_alloc+0x2b2/0x6f0 [ 459.330878] ? lock_downgrade+0x810/0x810 [ 459.335045] ? kasan_check_read+0x11/0x20 [ 459.339215] __kernfs_new_node+0xef/0x690 [ 459.343387] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 459.348166] ? wait_for_completion+0x440/0x440 [ 459.352770] ? mutex_unlock+0xd/0x10 [ 459.356493] ? kernfs_activate+0x192/0x1f0 [ 459.360745] kernfs_new_node+0x99/0x130 [ 459.364735] __kernfs_create_file+0x51/0x340 [ 459.369160] sysfs_add_file_mode_ns+0x222/0x560 [ 459.373848] internal_create_group+0x35b/0xc40 [ 459.378439] ? bd_set_size+0x89/0xb0 [ 459.382178] ? remove_files.isra.0+0x190/0x190 [ 459.386788] sysfs_create_group+0x20/0x30 [ 459.390948] lo_ioctl+0xf8f/0x20d0 [ 459.394514] ? lo_rw_aio+0x1530/0x1530 [ 459.398422] blkdev_ioctl+0xee8/0x1c40 [ 459.402328] ? blkpg_ioctl+0xa90/0xa90 [ 459.406223] ? find_held_lock+0x35/0x130 [ 459.410306] ? debug_check_no_obj_freed+0x200/0x464 [ 459.415339] ? __fget+0x340/0x540 [ 459.418803] ? ___might_sleep+0x163/0x280 [ 459.422964] block_ioctl+0xee/0x130 [ 459.426622] ? blkdev_fallocate+0x410/0x410 [ 459.430961] do_vfs_ioctl+0xd6e/0x1390 [ 459.434868] ? selinux_file_ioctl+0x46f/0x5e0 [ 459.439376] ? selinux_file_ioctl+0x125/0x5e0 [ 459.443880] ? ioctl_preallocate+0x210/0x210 [ 459.448313] ? selinux_file_mprotect+0x620/0x620 [ 459.453086] ? iterate_fd+0x360/0x360 [ 459.456898] ? do_sys_open+0x31d/0x5d0 [ 459.460805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.466356] ? security_file_ioctl+0x93/0xc0 [ 459.470780] ksys_ioctl+0xab/0xd0 [ 459.474245] __x64_sys_ioctl+0x73/0xb0 [ 459.478155] do_syscall_64+0x103/0x610 [ 459.482055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.487250] RIP: 0033:0x457c97 [ 459.490462] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.509381] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 459.517115] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 21:31:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x04\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 459.524407] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 459.531698] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 459.538988] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 459.546273] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) dup3(r0, r1, 0x80000) 21:31:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 459.644812] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 459.671841] kernel msg: ebtables bug: please report to author: bad policy 21:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:50 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x37c}], 0x1, 0x0) 21:31:50 executing program 1 (fault-call:2 fault-nth:16): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x05\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 459.889956] kvm [24868]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 [ 459.898980] FAULT_INJECTION: forcing a failure. [ 459.898980] name failslab, interval 1, probability 0, space 0, times 0 21:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 459.958846] CPU: 1 PID: 24979 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 459.966177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.975545] Call Trace: [ 459.978155] dump_stack+0x172/0x1f0 [ 459.981805] should_fail.cold+0xa/0x1b [ 459.985711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 459.991303] ? lock_downgrade+0x810/0x810 [ 459.995471] ? ___might_sleep+0x163/0x280 [ 459.999646] __should_failslab+0x121/0x190 [ 460.003904] should_failslab+0x9/0x14 [ 460.007718] kmem_cache_alloc+0x2b2/0x6f0 [ 460.011881] ? lock_downgrade+0x810/0x810 [ 460.016041] ? kasan_check_read+0x11/0x20 [ 460.020211] __kernfs_new_node+0xef/0x690 [ 460.024386] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 460.029157] ? wait_for_completion+0x440/0x440 [ 460.033763] ? mutex_unlock+0xd/0x10 [ 460.037489] ? kernfs_activate+0x192/0x1f0 [ 460.041740] kernfs_new_node+0x99/0x130 [ 460.045733] __kernfs_create_file+0x51/0x340 [ 460.050160] sysfs_add_file_mode_ns+0x222/0x560 [ 460.054851] internal_create_group+0x35b/0xc40 21:31:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) dup3(r0, r1, 0x80000) [ 460.059443] ? bd_set_size+0x89/0xb0 [ 460.063179] ? remove_files.isra.0+0x190/0x190 [ 460.067786] sysfs_create_group+0x20/0x30 [ 460.071947] lo_ioctl+0xf8f/0x20d0 [ 460.075500] ? lo_rw_aio+0x1530/0x1530 [ 460.079430] blkdev_ioctl+0xee8/0x1c40 [ 460.083357] ? blkpg_ioctl+0xa90/0xa90 [ 460.087263] ? find_held_lock+0x35/0x130 [ 460.089017] kvm [24868]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 460.091611] ? debug_check_no_obj_freed+0x200/0x464 [ 460.091633] ? __fget+0x340/0x540 [ 460.091653] ? ___might_sleep+0x163/0x280 [ 460.112930] block_ioctl+0xee/0x130 [ 460.116563] ? blkdev_fallocate+0x410/0x410 [ 460.120899] do_vfs_ioctl+0xd6e/0x1390 [ 460.124800] ? selinux_file_ioctl+0x46f/0x5e0 [ 460.129319] ? selinux_file_ioctl+0x125/0x5e0 [ 460.133834] ? ioctl_preallocate+0x210/0x210 [ 460.134511] kvm: pic: non byte read [ 460.138253] ? selinux_file_mprotect+0x620/0x620 [ 460.138289] ? iterate_fd+0x360/0x360 [ 460.138308] ? do_sys_open+0x31d/0x5d0 [ 460.138329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:31:50 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x37f}], 0x1, 0x0) [ 460.160037] ? security_file_ioctl+0x93/0xc0 [ 460.162853] kvm: pic: non byte read [ 460.164469] ksys_ioctl+0xab/0xd0 [ 460.164490] __x64_sys_ioctl+0x73/0xb0 [ 460.164510] do_syscall_64+0x103/0x610 [ 460.164531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.164544] RIP: 0033:0x457c97 [ 460.164560] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 460.164572] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.176616] kvm: pic: non byte read [ 460.179420] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 460.179430] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 460.179439] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 460.179448] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 460.179457] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 460.304942] kvm [24868]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 [ 460.325414] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 460.327239] kernel msg: ebtables bug: please report to author: bad policy 21:31:51 executing program 0: 21:31:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x388}], 0x1, 0x0) [ 460.350510] kvm [24868]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 [ 460.371859] kvm [24868]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000003a data 0x0 21:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:51 executing program 1 (fault-call:2 fault-nth:17): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x06\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:51 executing program 0: 21:31:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x38b}], 0x1, 0x0) 21:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 460.596050] FAULT_INJECTION: forcing a failure. [ 460.596050] name failslab, interval 1, probability 0, space 0, times 0 [ 460.654592] CPU: 0 PID: 25101 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 460.661923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.671303] Call Trace: [ 460.673919] dump_stack+0x172/0x1f0 [ 460.677577] should_fail.cold+0xa/0x1b [ 460.681486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 460.686622] ? lock_downgrade+0x810/0x810 [ 460.690793] ? ___might_sleep+0x163/0x280 [ 460.694967] __should_failslab+0x121/0x190 [ 460.699218] should_failslab+0x9/0x14 [ 460.703036] kmem_cache_alloc+0x2b2/0x6f0 [ 460.707217] ? lock_downgrade+0x810/0x810 [ 460.711380] ? kasan_check_read+0x11/0x20 [ 460.715548] __kernfs_new_node+0xef/0x690 [ 460.719728] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 460.724501] ? wait_for_completion+0x440/0x440 [ 460.729106] ? mutex_unlock+0xd/0x10 [ 460.732830] ? kernfs_activate+0x192/0x1f0 [ 460.737084] kernfs_new_node+0x99/0x130 [ 460.741078] __kernfs_create_file+0x51/0x340 [ 460.745508] sysfs_add_file_mode_ns+0x222/0x560 [ 460.750206] internal_create_group+0x35b/0xc40 [ 460.754803] ? bd_set_size+0x89/0xb0 [ 460.758541] ? remove_files.isra.0+0x190/0x190 [ 460.763164] sysfs_create_group+0x20/0x30 [ 460.767328] lo_ioctl+0xf8f/0x20d0 [ 460.770885] ? lo_rw_aio+0x1530/0x1530 [ 460.774792] blkdev_ioctl+0xee8/0x1c40 [ 460.778691] ? blkpg_ioctl+0xa90/0xa90 [ 460.782592] ? find_held_lock+0x35/0x130 [ 460.786670] ? debug_check_no_obj_freed+0x200/0x464 [ 460.791706] ? __fget+0x340/0x540 [ 460.795171] ? ___might_sleep+0x163/0x280 [ 460.799335] block_ioctl+0xee/0x130 [ 460.802976] ? blkdev_fallocate+0x410/0x410 [ 460.807318] do_vfs_ioctl+0xd6e/0x1390 [ 460.811248] ? selinux_file_ioctl+0x46f/0x5e0 [ 460.815771] ? selinux_file_ioctl+0x125/0x5e0 [ 460.820291] ? ioctl_preallocate+0x210/0x210 [ 460.824713] ? selinux_file_mprotect+0x620/0x620 [ 460.829489] ? iterate_fd+0x360/0x360 [ 460.833311] ? do_sys_open+0x31d/0x5d0 [ 460.837216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.842768] ? security_file_ioctl+0x93/0xc0 [ 460.847192] ksys_ioctl+0xab/0xd0 [ 460.850666] __x64_sys_ioctl+0x73/0xb0 [ 460.854581] do_syscall_64+0x103/0x610 [ 460.858489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.863693] RIP: 0033:0x457c97 [ 460.866897] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 460.886323] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.894053] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 21:31:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\a\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:51 executing program 0: [ 460.901338] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 460.908621] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 460.915902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 460.923182] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 461.007402] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:51 executing program 0: 21:31:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x396}], 0x1, 0x0) [ 461.118319] kernel msg: ebtables bug: please report to author: bad policy [ 461.128895] kvm: pic: non byte read [ 461.133983] kvm: pic: non byte read [ 461.169821] kvm: pic: non byte read 21:31:51 executing program 1 (fault-call:2 fault-nth:18): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:51 executing program 0: [ 461.330141] FAULT_INJECTION: forcing a failure. [ 461.330141] name failslab, interval 1, probability 0, space 0, times 0 [ 461.342652] CPU: 1 PID: 25327 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 461.349951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.359320] Call Trace: [ 461.361931] dump_stack+0x172/0x1f0 [ 461.365579] should_fail.cold+0xa/0x1b [ 461.369509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 461.374625] ? lock_downgrade+0x810/0x810 [ 461.378791] ? ___might_sleep+0x163/0x280 [ 461.382961] __should_failslab+0x121/0x190 [ 461.387208] should_failslab+0x9/0x14 [ 461.391018] kmem_cache_alloc+0x2b2/0x6f0 [ 461.395180] ? lock_downgrade+0x810/0x810 [ 461.399337] ? kasan_check_read+0x11/0x20 [ 461.403501] __kernfs_new_node+0xef/0x690 [ 461.407666] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 461.412439] ? wait_for_completion+0x440/0x440 [ 461.417043] ? mutex_unlock+0xd/0x10 [ 461.420770] ? kernfs_activate+0x192/0x1f0 [ 461.425018] kernfs_new_node+0x99/0x130 [ 461.429012] __kernfs_create_file+0x51/0x340 [ 461.433436] sysfs_add_file_mode_ns+0x222/0x560 [ 461.438125] internal_create_group+0x35b/0xc40 [ 461.442721] ? bd_set_size+0x89/0xb0 [ 461.446452] ? remove_files.isra.0+0x190/0x190 [ 461.451059] sysfs_create_group+0x20/0x30 [ 461.455225] lo_ioctl+0xf8f/0x20d0 [ 461.458781] ? lo_rw_aio+0x1530/0x1530 [ 461.462684] blkdev_ioctl+0xee8/0x1c40 [ 461.466586] ? blkpg_ioctl+0xa90/0xa90 [ 461.470481] ? find_held_lock+0x35/0x130 [ 461.474570] ? debug_check_no_obj_freed+0x200/0x464 [ 461.479596] ? __fget+0x340/0x540 [ 461.483063] ? ___might_sleep+0x163/0x280 [ 461.487330] block_ioctl+0xee/0x130 [ 461.490964] ? blkdev_fallocate+0x410/0x410 [ 461.495317] do_vfs_ioctl+0xd6e/0x1390 [ 461.499233] ? selinux_file_ioctl+0x46f/0x5e0 [ 461.503743] ? selinux_file_ioctl+0x125/0x5e0 [ 461.508248] ? ioctl_preallocate+0x210/0x210 [ 461.512681] ? selinux_file_mprotect+0x620/0x620 [ 461.517454] ? iterate_fd+0x360/0x360 [ 461.521267] ? do_sys_open+0x31d/0x5d0 [ 461.525180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.530731] ? security_file_ioctl+0x93/0xc0 [ 461.535152] ksys_ioctl+0xab/0xd0 [ 461.538623] __x64_sys_ioctl+0x73/0xb0 [ 461.542529] do_syscall_64+0x103/0x610 [ 461.546433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.551646] RIP: 0033:0x457c97 [ 461.554851] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 461.573768] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:31:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = gettid() r4 = gettid() kcmp(r3, r4, 0x6, r1, r2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a343c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x397}], 0x1, 0x0) 21:31:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x1000085) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)='-', 0x1}], 0x1, 0x0) dup3(r1, r0, 0x0) 21:31:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00`\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 461.581479] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 461.588759] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 461.596029] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 461.603306] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 461.610580] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 461.644317] net_ratelimit: 18 callbacks suppressed [ 461.644326] protocol 88fb is buggy, dev hsr_slave_0 [ 461.654440] protocol 88fb is buggy, dev hsr_slave_1 [ 461.678004] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:52 executing program 0: 21:31:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3a2}], 0x1, 0x0) [ 461.750655] kernel msg: ebtables bug: please report to author: bad policy 21:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:52 executing program 0: 21:31:52 executing program 1 (fault-call:2 fault-nth:19): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3a5}], 0x1, 0x0) 21:31:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80000000020, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000080)=0xffffffffffffffed, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 462.004655] kernel msg: ebtables bug: please report to author: bad policy 21:31:52 executing program 0: 21:31:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00U\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3a6}], 0x1, 0x0) 21:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 462.142085] FAULT_INJECTION: forcing a failure. [ 462.142085] name failslab, interval 1, probability 0, space 0, times 0 [ 462.203226] CPU: 0 PID: 25562 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 462.210582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.217919] kvm: pic: non byte read [ 462.219940] Call Trace: [ 462.219968] dump_stack+0x172/0x1f0 [ 462.219998] should_fail.cold+0xa/0x1b [ 462.233716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 462.238836] ? lock_downgrade+0x810/0x810 [ 462.243011] ? ___might_sleep+0x163/0x280 [ 462.247181] __should_failslab+0x121/0x190 [ 462.251436] should_failslab+0x9/0x14 [ 462.255247] kmem_cache_alloc_trace+0x2d1/0x760 [ 462.259949] kobject_uevent_env+0x2fb/0x1030 [ 462.264378] kobject_uevent+0x20/0x26 [ 462.268193] lo_ioctl+0x100b/0x20d0 [ 462.271838] ? lo_rw_aio+0x1530/0x1530 [ 462.275740] blkdev_ioctl+0xee8/0x1c40 [ 462.279642] ? blkpg_ioctl+0xa90/0xa90 [ 462.283537] ? find_held_lock+0x35/0x130 [ 462.287617] ? debug_check_no_obj_freed+0x200/0x464 [ 462.292654] ? __fget+0x340/0x540 [ 462.296127] ? ___might_sleep+0x163/0x280 [ 462.300313] block_ioctl+0xee/0x130 [ 462.303960] ? blkdev_fallocate+0x410/0x410 [ 462.308311] do_vfs_ioctl+0xd6e/0x1390 [ 462.312212] ? selinux_file_ioctl+0x46f/0x5e0 [ 462.316721] ? selinux_file_ioctl+0x125/0x5e0 [ 462.321225] ? ioctl_preallocate+0x210/0x210 [ 462.325644] ? selinux_file_mprotect+0x620/0x620 [ 462.330419] ? iterate_fd+0x360/0x360 [ 462.334233] ? do_sys_open+0x31d/0x5d0 [ 462.338141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.343691] ? security_file_ioctl+0x93/0xc0 [ 462.348112] ksys_ioctl+0xab/0xd0 [ 462.351586] __x64_sys_ioctl+0x73/0xb0 [ 462.355490] do_syscall_64+0x103/0x610 [ 462.359396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.364597] RIP: 0033:0x457c97 [ 462.367798] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.386733] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.394458] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 462.401736] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 462.409012] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 462.416299] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 462.423607] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 462.431188] protocol 88fb is buggy, dev hsr_slave_0 [ 462.436333] protocol 88fb is buggy, dev hsr_slave_1 [ 462.441461] protocol 88fb is buggy, dev hsr_slave_0 [ 462.446560] protocol 88fb is buggy, dev hsr_slave_1 [ 462.451797] protocol 88fb is buggy, dev hsr_slave_0 [ 462.456904] protocol 88fb is buggy, dev hsr_slave_1 [ 462.502654] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 462.524337] protocol 88fb is buggy, dev hsr_slave_0 [ 462.529520] protocol 88fb is buggy, dev hsr_slave_1 21:31:53 executing program 0: 21:31:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3b3}], 0x1, 0x0) [ 462.567322] kernel msg: ebtables bug: please report to author: bad policy 21:31:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:53 executing program 1 (fault-call:2 fault-nth:20): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:53 executing program 0: 21:31:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00c\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 462.741705] FAULT_INJECTION: forcing a failure. [ 462.741705] name failslab, interval 1, probability 0, space 0, times 0 [ 462.758201] CPU: 1 PID: 25682 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 462.765505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.774865] Call Trace: [ 462.777476] dump_stack+0x172/0x1f0 [ 462.781120] should_fail.cold+0xa/0x1b [ 462.785022] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 462.790132] ? lock_downgrade+0x810/0x810 [ 462.794311] ? ___might_sleep+0x163/0x280 [ 462.798480] __should_failslab+0x121/0x190 [ 462.802735] should_failslab+0x9/0x14 [ 462.806546] kmem_cache_alloc_trace+0x2d1/0x760 [ 462.811238] kobject_uevent_env+0x2fb/0x1030 [ 462.815670] kobject_uevent+0x20/0x26 [ 462.819485] lo_ioctl+0x100b/0x20d0 [ 462.823139] ? lo_rw_aio+0x1530/0x1530 [ 462.827040] blkdev_ioctl+0xee8/0x1c40 [ 462.830965] ? blkpg_ioctl+0xa90/0xa90 [ 462.834865] ? find_held_lock+0x35/0x130 [ 462.838944] ? debug_check_no_obj_freed+0x200/0x464 [ 462.843976] ? __fget+0x340/0x540 [ 462.847442] ? ___might_sleep+0x163/0x280 [ 462.851608] block_ioctl+0xee/0x130 [ 462.855243] ? blkdev_fallocate+0x410/0x410 [ 462.859588] do_vfs_ioctl+0xd6e/0x1390 [ 462.863495] ? selinux_file_ioctl+0x46f/0x5e0 [ 462.868004] ? selinux_file_ioctl+0x125/0x5e0 [ 462.872514] ? ioctl_preallocate+0x210/0x210 [ 462.876938] ? selinux_file_mprotect+0x620/0x620 [ 462.881716] ? iterate_fd+0x360/0x360 [ 462.885785] ? do_sys_open+0x31d/0x5d0 [ 462.889692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.895249] ? security_file_ioctl+0x93/0xc0 [ 462.899688] ksys_ioctl+0xab/0xd0 [ 462.903171] __x64_sys_ioctl+0x73/0xb0 [ 462.907079] do_syscall_64+0x103/0x610 [ 462.910984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.916178] RIP: 0033:0x457c97 [ 462.919379] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.938316] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.946046] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 462.953329] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 462.960602] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 462.967890] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 462.975169] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 463.041595] kernel msg: ebtables bug: please report to author: bad policy [ 463.049344] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:53 executing program 4: 21:31:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3b4}], 0x1, 0x0) 21:31:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:53 executing program 0: 21:31:53 executing program 1 (fault-call:2 fault-nth:21): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:54 executing program 0: 21:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 463.251759] FAULT_INJECTION: forcing a failure. [ 463.251759] name failslab, interval 1, probability 0, space 0, times 0 [ 463.265180] kernel msg: ebtables bug: please report to author: bad policy [ 463.292129] CPU: 0 PID: 25799 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 463.299445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.308807] Call Trace: [ 463.311423] dump_stack+0x172/0x1f0 [ 463.315078] should_fail.cold+0xa/0x1b [ 463.318997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 463.324120] ? lock_downgrade+0x810/0x810 [ 463.328295] ? ___might_sleep+0x163/0x280 [ 463.332466] __should_failslab+0x121/0x190 [ 463.336717] should_failslab+0x9/0x14 [ 463.340526] __kmalloc+0x2dc/0x740 [ 463.344079] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 463.349550] ? rcu_read_lock_sched_held+0x110/0x130 [ 463.354599] ? kobject_get_path+0xc4/0x1b0 [ 463.358854] kobject_get_path+0xc4/0x1b0 [ 463.362930] kobject_uevent_env+0x31f/0x1030 [ 463.367359] kobject_uevent+0x20/0x26 [ 463.371178] lo_ioctl+0x100b/0x20d0 [ 463.374820] ? lo_rw_aio+0x1530/0x1530 [ 463.378727] blkdev_ioctl+0xee8/0x1c40 [ 463.382630] ? blkpg_ioctl+0xa90/0xa90 [ 463.386527] ? find_held_lock+0x35/0x130 [ 463.390612] ? debug_check_no_obj_freed+0x200/0x464 [ 463.395643] ? __fget+0x340/0x540 [ 463.399113] ? ___might_sleep+0x163/0x280 [ 463.403275] block_ioctl+0xee/0x130 [ 463.406920] ? blkdev_fallocate+0x410/0x410 [ 463.411252] do_vfs_ioctl+0xd6e/0x1390 [ 463.415166] ? selinux_file_ioctl+0x46f/0x5e0 [ 463.419678] ? selinux_file_ioctl+0x125/0x5e0 [ 463.424184] ? ioctl_preallocate+0x210/0x210 [ 463.428612] ? selinux_file_mprotect+0x620/0x620 [ 463.433384] ? iterate_fd+0x360/0x360 [ 463.437195] ? do_sys_open+0x31d/0x5d0 [ 463.441104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.446661] ? security_file_ioctl+0x93/0xc0 [ 463.451086] ksys_ioctl+0xab/0xd0 [ 463.454556] __x64_sys_ioctl+0x73/0xb0 [ 463.458499] do_syscall_64+0x103/0x610 [ 463.462406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.467609] RIP: 0033:0x457c97 [ 463.470810] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:31:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3b5}], 0x1, 0x0) 21:31:54 executing program 4: [ 463.489714] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.497429] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 463.504708] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 463.511984] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 463.519257] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 463.526547] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:54 executing program 4: [ 463.580595] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:54 executing program 0: 21:31:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3b9}], 0x1, 0x0) 21:31:54 executing program 1 (fault-call:2 fault-nth:22): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:54 executing program 4: [ 463.798221] kernel msg: ebtables bug: please report to author: bad policy 21:31:54 executing program 0: [ 463.845190] FAULT_INJECTION: forcing a failure. [ 463.845190] name failslab, interval 1, probability 0, space 0, times 0 [ 463.863930] CPU: 1 PID: 25922 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 463.871228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.880600] Call Trace: [ 463.883204] dump_stack+0x172/0x1f0 [ 463.886848] should_fail.cold+0xa/0x1b [ 463.890757] ? fault_create_debugfs_attr+0x1e0/0x1e0 21:31:54 executing program 4: [ 463.895877] ? lock_downgrade+0x810/0x810 [ 463.900040] ? ___might_sleep+0x163/0x280 [ 463.904220] __should_failslab+0x121/0x190 [ 463.908475] should_failslab+0x9/0x14 [ 463.912304] kmem_cache_alloc_node+0x264/0x710 [ 463.916901] ? find_held_lock+0x35/0x130 [ 463.920992] __alloc_skb+0xd5/0x5e0 [ 463.924649] ? skb_scrub_packet+0x440/0x440 [ 463.929018] ? kasan_check_read+0x11/0x20 [ 463.933214] alloc_uevent_skb+0x83/0x1e2 [ 463.937306] kobject_uevent_env+0xa63/0x1030 [ 463.941746] kobject_uevent+0x20/0x26 [ 463.945562] lo_ioctl+0x100b/0x20d0 [ 463.949209] ? lo_rw_aio+0x1530/0x1530 [ 463.953118] blkdev_ioctl+0xee8/0x1c40 [ 463.957024] ? blkpg_ioctl+0xa90/0xa90 [ 463.960921] ? find_held_lock+0x35/0x130 [ 463.965018] ? debug_check_no_obj_freed+0x200/0x464 [ 463.970061] ? __fget+0x340/0x540 [ 463.973540] ? ___might_sleep+0x163/0x280 [ 463.977711] block_ioctl+0xee/0x130 [ 463.981346] ? blkdev_fallocate+0x410/0x410 [ 463.985681] do_vfs_ioctl+0xd6e/0x1390 [ 463.989581] ? selinux_file_ioctl+0x46f/0x5e0 [ 463.994135] ? selinux_file_ioctl+0x125/0x5e0 [ 463.998670] ? ioctl_preallocate+0x210/0x210 [ 464.003103] ? selinux_file_mprotect+0x620/0x620 [ 464.007880] ? iterate_fd+0x360/0x360 [ 464.011696] ? do_sys_open+0x31d/0x5d0 [ 464.015606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.021159] ? security_file_ioctl+0x93/0xc0 [ 464.025585] ksys_ioctl+0xab/0xd0 [ 464.029058] __x64_sys_ioctl+0x73/0xb0 [ 464.032968] do_syscall_64+0x103/0x610 [ 464.036877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.042083] RIP: 0033:0x457c97 [ 464.045294] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.064234] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.071967] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 464.079241] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 464.086530] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 21:31:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00U\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 464.093816] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 464.101100] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3bc}], 0x1, 0x0) [ 464.166743] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:31:54 executing program 4: 21:31:54 executing program 0: 21:31:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3c3}], 0x1, 0x0) 21:31:55 executing program 0: 21:31:55 executing program 1 (fault-call:2 fault-nth:23): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:55 executing program 4: 21:31:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x0, 0x0, 0x0) 21:31:55 executing program 0: 21:31:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3c9}], 0x1, 0x0) [ 464.755983] FAULT_INJECTION: forcing a failure. [ 464.755983] name failslab, interval 1, probability 0, space 0, times 0 [ 464.794898] CPU: 1 PID: 26050 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 464.802224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.811584] Call Trace: [ 464.814193] dump_stack+0x172/0x1f0 [ 464.817841] should_fail.cold+0xa/0x1b [ 464.821747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.826870] ? lock_downgrade+0x810/0x810 [ 464.831037] ? ___might_sleep+0x163/0x280 [ 464.835211] __should_failslab+0x121/0x190 [ 464.839472] should_failslab+0x9/0x14 [ 464.843296] kmem_cache_alloc_node_trace+0x270/0x720 [ 464.848418] ? __alloc_skb+0xd5/0x5e0 [ 464.852233] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 464.857701] __kmalloc_node_track_caller+0x3d/0x70 [ 464.862650] __kmalloc_reserve.isra.0+0x40/0xf0 [ 464.867367] __alloc_skb+0x10b/0x5e0 [ 464.871104] ? skb_scrub_packet+0x440/0x440 [ 464.875448] ? kasan_check_read+0x11/0x20 [ 464.879615] alloc_uevent_skb+0x83/0x1e2 [ 464.884128] kobject_uevent_env+0xa63/0x1030 [ 464.888565] kobject_uevent+0x20/0x26 [ 464.892479] lo_ioctl+0x100b/0x20d0 [ 464.896123] ? lo_rw_aio+0x1530/0x1530 [ 464.900023] blkdev_ioctl+0xee8/0x1c40 [ 464.903925] ? blkpg_ioctl+0xa90/0xa90 [ 464.907825] ? find_held_lock+0x35/0x130 [ 464.911899] ? debug_check_no_obj_freed+0x200/0x464 [ 464.916935] ? __fget+0x340/0x540 [ 464.920408] ? ___might_sleep+0x163/0x280 [ 464.924581] block_ioctl+0xee/0x130 [ 464.928218] ? blkdev_fallocate+0x410/0x410 [ 464.932553] do_vfs_ioctl+0xd6e/0x1390 [ 464.936456] ? selinux_file_ioctl+0x46f/0x5e0 [ 464.940964] ? selinux_file_ioctl+0x125/0x5e0 [ 464.945472] ? ioctl_preallocate+0x210/0x210 [ 464.949900] ? selinux_file_mprotect+0x620/0x620 [ 464.954680] ? iterate_fd+0x360/0x360 [ 464.958494] ? do_sys_open+0x31d/0x5d0 [ 464.962401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.967951] ? security_file_ioctl+0x93/0xc0 [ 464.972374] ksys_ioctl+0xab/0xd0 [ 464.975842] __x64_sys_ioctl+0x73/0xb0 [ 464.979743] do_syscall_64+0x103/0x610 [ 464.983645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.988848] RIP: 0033:0x457c97 [ 464.992584] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.011503] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.019229] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 465.026513] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 465.033799] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 465.041088] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 465.048369] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 465.100887] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 465.555268] device bridge_slave_1 left promiscuous mode [ 465.560812] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.584716] device bridge_slave_0 left promiscuous mode [ 465.590219] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.685297] device hsr_slave_1 left promiscuous mode [ 465.698884] device hsr_slave_0 left promiscuous mode [ 465.710256] team0 (unregistering): Port device team_slave_1 removed [ 465.742195] team0 (unregistering): Port device team_slave_0 removed [ 465.782732] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 465.821579] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 465.947892] bond0 (unregistering): Released all slaves [ 466.684376] net_ratelimit: 20 callbacks suppressed [ 466.684385] protocol 88fb is buggy, dev hsr_slave_0 [ 466.694462] protocol 88fb is buggy, dev hsr_slave_1 [ 467.404338] protocol 88fb is buggy, dev hsr_slave_0 [ 467.409459] protocol 88fb is buggy, dev hsr_slave_1 [ 467.511675] IPVS: ftp: loaded support on port[0] = 21 [ 467.671981] chnl_net:caif_netlink_parms(): no params data found [ 467.719797] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.727423] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.739966] device bridge_slave_0 entered promiscuous mode [ 467.747698] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.754134] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.761777] device bridge_slave_1 entered promiscuous mode [ 467.783479] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 467.793768] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 467.823971] team0: Port device team_slave_0 added [ 467.837101] team0: Port device team_slave_1 added [ 467.869266] device hsr_slave_0 entered promiscuous mode [ 467.877369] device hsr_slave_1 entered promiscuous mode [ 467.884344] protocol 88fb is buggy, dev hsr_slave_0 [ 467.889437] protocol 88fb is buggy, dev hsr_slave_1 [ 467.900489] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.906905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.913587] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.920033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.991015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 468.012768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 468.021242] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.035459] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.043553] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 468.062843] 8021q: adding VLAN 0 to HW filter on device team0 [ 468.081034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 468.092526] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.098969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.133466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 468.142468] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.148901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.163961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 468.180802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 468.188546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 468.196695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 468.217420] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 468.235348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 468.242865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 468.279792] 8021q: adding VLAN 0 to HW filter on device batadv0 21:31:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00c\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:31:59 executing program 4: 21:31:59 executing program 0: 21:31:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x0, 0x0, 0x0) 21:31:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3d0}], 0x1, 0x0) 21:31:59 executing program 1 (fault-call:2 fault-nth:24): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 468.344307] protocol 88fb is buggy, dev hsr_slave_0 [ 468.346673] kernel msg: ebtables bug: please report to author: bad policy [ 468.349421] protocol 88fb is buggy, dev hsr_slave_1 [ 468.359317] kernel msg: ebtables bug: please report to author: bad policy [ 468.451622] FAULT_INJECTION: forcing a failure. [ 468.451622] name failslab, interval 1, probability 0, space 0, times 0 [ 468.464353] protocol 88fb is buggy, dev hsr_slave_0 [ 468.469476] protocol 88fb is buggy, dev hsr_slave_1 [ 468.482359] CPU: 1 PID: 26071 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 468.489669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.499028] Call Trace: 21:31:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x0, 0x0, 0x0) [ 468.501635] dump_stack+0x172/0x1f0 [ 468.505293] should_fail.cold+0xa/0x1b [ 468.509201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 468.514330] ? lock_downgrade+0x810/0x810 [ 468.518491] ? ___might_sleep+0x163/0x280 [ 468.522664] __should_failslab+0x121/0x190 [ 468.526918] should_failslab+0x9/0x14 [ 468.530736] kmem_cache_alloc+0x2b2/0x6f0 [ 468.534910] getname_flags+0xd6/0x5b0 [ 468.538734] do_mkdirat+0xa0/0x2a0 [ 468.542311] ? __ia32_sys_mknod+0xb0/0xb0 21:31:59 executing program 0: 21:31:59 executing program 4: 21:31:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3d9}], 0x1, 0x0) [ 468.543215] kernel msg: ebtables bug: please report to author: bad policy [ 468.546475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.546491] ? do_syscall_64+0x26/0x610 [ 468.546506] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.546519] ? do_syscall_64+0x26/0x610 [ 468.546535] ? lockdep_hardirqs_on+0x415/0x5d0 [ 468.546556] __x64_sys_mkdir+0x5c/0x80 [ 468.546574] do_syscall_64+0x103/0x610 [ 468.546593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.546605] RIP: 0033:0x457247 21:31:59 executing program 4: [ 468.546620] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.546628] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 468.546643] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 468.546652] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 468.546659] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 468.546667] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 21:31:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x02\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 468.546675] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:31:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x400002, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0, 0xb4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000002c0)={r4, 0x5}, &(0x7f0000000300)=0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f00000001c0)={0x0, 0x4, 0x4, [], &(0x7f0000000180)=0xad89}) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) 21:31:59 executing program 1 (fault-call:2 fault-nth:25): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:31:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000140)={{}, [@rose, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x300}, @null, @netrom, @bcast, @null]}, 0x48) getpeername(r0, 0x0, &(0x7f00000003c0)) [ 468.769477] kernel msg: ebtables bug: please report to author: bad policy 21:31:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3dc}], 0x1, 0x0) 21:31:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) dup3(r0, r1, 0x0) [ 468.857403] kernel msg: ebtables bug: please report to author: bad policy 21:31:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 468.949858] FAULT_INJECTION: forcing a failure. [ 468.949858] name failslab, interval 1, probability 0, space 0, times 0 [ 468.970974] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de [ 468.991022] kvm: pic: non byte read [ 469.000736] kvm: pic: non byte read [ 469.004855] CPU: 1 PID: 26096 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 469.012153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.016160] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de [ 469.022131] Call Trace: [ 469.033210] dump_stack+0x172/0x1f0 [ 469.034115] kvm: pic: non byte read [ 469.036861] should_fail.cold+0xa/0x1b [ 469.036881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.036899] ? lock_downgrade+0x810/0x810 [ 469.036917] ? ___might_sleep+0x163/0x280 [ 469.036941] __should_failslab+0x121/0x190 [ 469.036961] should_failslab+0x9/0x14 [ 469.036976] kmem_cache_alloc+0x2b2/0x6f0 [ 469.036993] ? __d_lookup+0x433/0x760 [ 469.037010] ? lookup_dcache+0x23/0x140 [ 469.042924] kvm: pic: non byte read [ 469.044534] ? d_lookup+0xf9/0x260 [ 469.044554] ? lockdep_hardirqs_on+0x415/0x5d0 [ 469.044573] __d_alloc+0x2e/0x8c0 [ 469.044588] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 469.044606] d_alloc+0x4d/0x2b0 [ 469.044627] __lookup_hash+0xcd/0x190 [ 469.044649] filename_create+0x1a7/0x4f0 [ 469.044671] ? kern_path_mountpoint+0x40/0x40 [ 469.044686] ? strncpy_from_user+0x2a8/0x380 [ 469.044705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.051498] kvm: pic: non byte read [ 469.053958] ? getname_flags+0x277/0x5b0 [ 469.053981] do_mkdirat+0xb5/0x2a0 [ 469.054004] ? __ia32_sys_mknod+0xb0/0xb0 [ 469.054021] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 469.054040] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.061650] kvm: pic: non byte read [ 469.062428] ? do_syscall_64+0x26/0x610 [ 469.062446] ? lockdep_hardirqs_on+0x415/0x5d0 [ 469.062468] __x64_sys_mkdir+0x5c/0x80 [ 469.062487] do_syscall_64+0x103/0x610 [ 469.062508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.062521] RIP: 0033:0x457247 21:31:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3e1}], 0x1, 0x0) [ 469.062538] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.068206] kvm: pic: non byte read [ 469.070466] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 469.070483] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 469.070492] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 469.070501] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 469.070511] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 469.070520] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 469.258121] kvm: pic: non byte read [ 469.263334] kvm: pic: non byte read [ 469.269707] kvm: pic: non byte read [ 469.296029] kernel msg: ebtables bug: please report to author: bad policy 21:32:00 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x0, 0x0) read(r0, &(0x7f0000004200)=""/4096, 0xfea3) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000700)) 21:32:00 executing program 4: r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) 21:32:00 executing program 1 (fault-call:2 fault-nth:26): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 469.322918] kernel msg: ebtables bug: please report to author: bad policy 21:32:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x04\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:32:00 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) setpriority(0x0, r0, 0x10000) prctl$PR_CAPBSET_DROP(0x18, 0xc) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0xe24}]}, 0x14, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000002c0)=r0) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) socket(0x1e, 0x800, 0xef) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000780)={0x9, @pix={0x69c4, 0x1f, 0x36335f5e, 0x8, 0x6, 0x7fff, 0x7, 0xb4, 0x1, 0x7, 0x2, 0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 469.494725] FAULT_INJECTION: forcing a failure. [ 469.494725] name failslab, interval 1, probability 0, space 0, times 0 [ 469.506843] CPU: 1 PID: 26118 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 469.514156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.523537] Call Trace: [ 469.526152] dump_stack+0x172/0x1f0 [ 469.529804] should_fail.cold+0xa/0x1b [ 469.533726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.538862] ? lock_downgrade+0x810/0x810 [ 469.538881] ? ___might_sleep+0x163/0x280 [ 469.538901] __should_failslab+0x121/0x190 [ 469.538919] should_failslab+0x9/0x14 [ 469.538932] kmem_cache_alloc+0x2b2/0x6f0 [ 469.538947] ? __d_lookup+0x433/0x760 [ 469.538961] ? lookup_dcache+0x23/0x140 [ 469.538979] ? d_lookup+0xf9/0x260 [ 469.570842] ? lockdep_hardirqs_on+0x415/0x5d0 [ 469.575456] __d_alloc+0x2e/0x8c0 [ 469.578932] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 469.583979] d_alloc+0x4d/0x2b0 [ 469.587310] __lookup_hash+0xcd/0x190 [ 469.591144] filename_create+0x1a7/0x4f0 [ 469.595235] ? kern_path_mountpoint+0x40/0x40 [ 469.599768] ? strncpy_from_user+0x2a8/0x380 [ 469.604201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.604219] ? getname_flags+0x277/0x5b0 [ 469.604243] do_mkdirat+0xb5/0x2a0 [ 469.604262] ? __ia32_sys_mknod+0xb0/0xb0 [ 469.604289] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 469.604307] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.604321] ? do_syscall_64+0x26/0x610 [ 469.604336] ? lockdep_hardirqs_on+0x415/0x5d0 [ 469.604357] __x64_sys_mkdir+0x5c/0x80 [ 469.604374] do_syscall_64+0x103/0x610 [ 469.604392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.653334] RIP: 0033:0x457247 [ 469.656539] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.675454] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 469.683266] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 469.690563] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 469.697867] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 469.705150] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 469.712440] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 469.731350] kernel msg: ebtables bug: please report to author: bad policy [ 469.742381] kernel msg: ebtables bug: please report to author: bad policy [ 469.762906] kvm_hv_set_msr: 12 callbacks suppressed [ 469.762961] kvm [26087]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000058 data 0x0 [ 469.790662] kvm [26087]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000050 data 0x0 21:32:00 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x0, 0x0) read(r0, &(0x7f0000004200)=""/4096, 0xfea3) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000700)) 21:32:00 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3e2}], 0x1, 0x0) 21:32:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x05\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:32:00 executing program 1 (fault-call:2 fault-nth:27): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:00 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x400002, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0, 0xb4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000002c0)={r4, 0x5}, &(0x7f0000000300)=0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f00000001c0)={0x0, 0x4, 0x4, [], &(0x7f0000000180)=0xad89}) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) [ 470.023660] FAULT_INJECTION: forcing a failure. [ 470.023660] name failslab, interval 1, probability 0, space 0, times 0 [ 470.036571] kernel msg: ebtables bug: please report to author: bad policy [ 470.043858] CPU: 0 PID: 26146 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 470.051173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.053689] FAULT_INJECTION: forcing a failure. [ 470.053689] name failslab, interval 1, probability 0, space 0, times 0 [ 470.060553] Call Trace: [ 470.060594] dump_stack+0x172/0x1f0 [ 470.060616] should_fail.cold+0xa/0x1b [ 470.060635] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.060653] ? security_compute_sid.part.0+0xbcb/0x1600 [ 470.060673] ? ___might_sleep+0x163/0x280 [ 470.060701] __should_failslab+0x121/0x190 [ 470.101251] ? ratelimit_state_init+0xb0/0xb0 [ 470.105823] should_failslab+0x9/0x14 [ 470.109658] kmem_cache_alloc+0x2b2/0x6f0 [ 470.113932] ? security_compute_sid.part.0+0xbea/0x1600 [ 470.119338] ? rcu_read_lock_sched_held+0x110/0x130 [ 470.124385] ? ebitmap_destroy+0xba/0xf0 [ 470.128481] ? ratelimit_state_init+0xb0/0xb0 [ 470.133008] ext4_alloc_inode+0x1f/0x640 [ 470.137105] ? ratelimit_state_init+0xb0/0xb0 [ 470.141637] alloc_inode+0x66/0x190 [ 470.145307] new_inode_pseudo+0x19/0xf0 [ 470.149416] new_inode+0x1f/0x40 [ 470.152905] __ext4_new_inode+0x3cb/0x52c0 [ 470.157196] ? kasan_check_read+0x11/0x20 [ 470.161389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.166983] ? ext4_free_inode+0x1470/0x1470 [ 470.171634] ? dquot_get_next_dqblk+0x180/0x180 [ 470.176359] ? selinux_determine_inode_label+0x1b1/0x360 [ 470.181861] ext4_mkdir+0x3d5/0xdf0 [ 470.185541] ? ext4_init_dot_dotdot+0x520/0x520 [ 470.190296] ? selinux_inode_mkdir+0x23/0x30 [ 470.194740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.200348] ? security_inode_mkdir+0xee/0x120 [ 470.204980] vfs_mkdir+0x433/0x690 [ 470.208580] do_mkdirat+0x234/0x2a0 [ 470.212674] ? __ia32_sys_mknod+0xb0/0xb0 [ 470.216865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.221775] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.227375] ? do_syscall_64+0x26/0x610 [ 470.231394] ? lockdep_hardirqs_on+0x415/0x5d0 [ 470.236013] __x64_sys_mkdir+0x5c/0x80 [ 470.239946] do_syscall_64+0x103/0x610 [ 470.243871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.249082] RIP: 0033:0x457247 [ 470.252300] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.271332] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 470.279071] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 470.286419] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 470.293711] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 470.301017] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 470.308310] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 470.315631] CPU: 1 PID: 26150 Comm: syz-executor.4 Not tainted 5.0.0-rc8+ #88 21:32:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140), 0x0, 0x1f}, {&(0x7f0000000180)="6cdbb39c43858bac4299862cd548ff13be68bb9ee6dd39675386b52860141ce4eeee5ec6d7309d33e36fcb45c8cbe26fd93f778f591a33ab49a6100ff06e5f7a2aeb660d583fadb737086983e5bac23f05743f400ac39e1a3a2355e25cd3515714552652e3fd1006e67f961ea6034f032049ed3364dbcd7adc0eb9796afd3307f087ee524cab9c80663557e16c5dc2c26181f540d5ee43d2", 0x98, 0x4}], 0x800, &(0x7f0000000340)={[{@errors_remount='errors=remount-ro'}, {@errors_recover='errors=recover'}, {@show_sys_files_no='show_sys_files=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@errors_remount='errors=remount-ro'}, {@disable_sparse_yes='disable_sparse=yes'}, {@case_sensitive_yes='case_sensitive=yes'}], [{@euid_lt={'euid<', r1}}, {@obj_role={'obj_role', 0x3d, 'keyring'}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'posix_acl_accessmime_type'}}]}) sendto$inet(r0, 0x0, 0x0, 0x20004044, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r3, 0xc028aa03, &(0x7f0000000000)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x1, 0x20000) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f0000000480)={0xa, 0x200, 0xf385, 0x4000, r5}) [ 470.322936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.332319] Call Trace: [ 470.334934] dump_stack+0x172/0x1f0 [ 470.338592] should_fail.cold+0xa/0x1b [ 470.342503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.347722] ? __mutex_lock+0x3cd/0x1310 [ 470.351820] __should_failslab+0x121/0x190 [ 470.356701] should_failslab+0x9/0x14 [ 470.360599] kmem_cache_alloc+0x47/0x6f0 [ 470.364686] ? __lock_acquire+0x53b/0x4700 [ 470.368957] ? __lock_acquire+0x53b/0x4700 [ 470.373254] __build_skb+0x3e/0x310 [ 470.376920] __napi_alloc_skb+0x1d2/0x300 [ 470.381097] napi_get_frags+0x65/0x140 [ 470.385109] tun_get_user+0x1681/0x3dd0 [ 470.389194] ? mark_held_locks+0x100/0x100 [ 470.393644] ? tun_build_skb.isra.0+0x1150/0x1150 [ 470.398511] ? tun_get+0x171/0x290 [ 470.402101] ? lock_downgrade+0x810/0x810 [ 470.406294] ? kasan_check_read+0x11/0x20 [ 470.410492] tun_chr_write_iter+0xbd/0x160 [ 470.414754] do_iter_readv_writev+0x5e0/0x8e0 [ 470.419296] ? vfs_dedupe_file_range+0x780/0x780 [ 470.424098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.429677] ? rw_verify_area+0x118/0x360 [ 470.432998] kernel msg: ebtables bug: please report to author: bad policy [ 470.433867] do_iter_write+0x184/0x610 [ 470.433885] ? dup_iter+0x260/0x260 [ 470.433908] vfs_writev+0x1b3/0x2f0 [ 470.452042] ? vfs_iter_write+0xb0/0xb0 [ 470.456067] ? kasan_check_read+0x11/0x20 [ 470.460260] ? iterate_fd+0x360/0x360 [ 470.464111] ? check_preemption_disabled+0x48/0x290 [ 470.469155] ? wait_for_completion+0x440/0x440 21:32:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3e7}], 0x1, 0x0) [ 470.473770] ? __fget_light+0x1a9/0x230 [ 470.477765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.484078] do_writev+0xf6/0x290 [ 470.487552] ? vfs_writev+0x2f0/0x2f0 [ 470.491384] ? do_syscall_64+0x26/0x610 [ 470.495387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.500772] ? do_syscall_64+0x26/0x610 [ 470.504778] __x64_sys_writev+0x75/0xb0 [ 470.508783] do_syscall_64+0x103/0x610 [ 470.512706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.518358] RIP: 0033:0x457ce1 [ 470.518376] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 470.518386] RSP: 002b:00007fb949ccdba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 470.518402] RAX: ffffffffffffffda RBX: 0000000000300b00 RCX: 0000000000457ce1 [ 470.518411] RDX: 0000000000000001 RSI: 00007fb949ccdbf0 RDI: 00000000000000f0 [ 470.518420] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 21:32:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x06\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 470.518434] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fb949cce6d4 [ 470.540566] R13: 00000000004c64e1 R14: 00000000004db9c0 R15: 0000000000000004 [ 470.614019] ntfs: (device loop0): parse_options(): Unrecognized mount option euid<00000000000000000000. 21:32:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f00000000c0)={0x14, 0x4, 0x6}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x18, 0x32, 0x829, 0x0, 0x0, {0x3, 0x40000}, [@nested={0x4}]}, 0x18}}, 0x0) [ 470.665166] ntfs: (device loop0): parse_options(): Unrecognized mount option obj_role. [ 470.673275] ntfs: (device loop0): parse_options(): Unrecognized mount option dont_hash. 21:32:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3ea}], 0x1, 0x0) [ 470.734419] ntfs: (device loop0): parse_options(): Unrecognized mount option smackfstransmute. [ 470.769908] kernel msg: ebtables bug: please report to author: bad policy 21:32:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r1, r1, &(0x7f0000001680)=0x81, 0x7) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r2 = getpid() setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) stat(0x0, 0x0) setgroups(0x0, 0x0) setregid(0x0, 0x0) ptrace(0x10, r2) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e6993ac9cd961073"], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000004c0)={0x80000001, 0x0, 0x0, 0x4}) r3 = dup3(r0, r0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8, &(0x7f0000001740), 0x8) fcntl$getflags(r3, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x4000, 0x0) 21:32:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\a\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 470.813630] kernel msg: ebtables bug: please report to author: bad policy 21:32:01 executing program 2: syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000100000009000007000000000000000000000000"], 0x38) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getgid() tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, 0x0) clock_gettime(0x6, &(0x7f0000000000)) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f00000000c0)={0x1, "cab1f0573280f5b064597f778539fe5ee6c3fcc7207135c6018269e0764e5b0d"}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000200)) 21:32:01 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000500)="0af51f023c123f3188a0") mkdir(&(0x7f0000000280)='./file1\x00', 0x10) fcntl$setsig(r0, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') r2 = getegid() getgroups(0x3, &(0x7f0000000480)=[r2, 0xee00, 0x0]) setregid(r3, r4) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) 21:32:01 executing program 1 (fault-call:2 fault-nth:28): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x2000)=nil) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000200)={{0x3ff, 0x1}, {0x3e4, 0x100000000}, 0x0, 0x2, 0xbbcf}) wait4(r2, 0x0, 0x80000, 0x0) fchdir(r0) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) r4 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x66d2f62cae109c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000c00)='./file0\x00') r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41}, &(0x7f0000000180)=0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000c40)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x1}) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000c80)={0x3, 0x9}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, 0x0, &(0x7f0000000d80)) fchdir(r5) write$P9_RWRITE(r4, &(0x7f0000000500)={0xb, 0x77, 0x2, 0x1f}, 0xb) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) mount(&(0x7f0000000b40)=ANY=[@ANYBLOB="4ec0ebbf20c9b79c8f78"], 0x0, &(0x7f0000000080)='anon_inodefs\x00', 0x0, &(0x7f0000000dc0)) fallocate(r0, 0x40, 0xbc, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='environ\x00') preadv(r7, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) [ 470.998491] kernel msg: ebtables bug: please report to author: bad policy [ 471.048372] kernel msg: ebtables bug: please report to author: bad policy [ 471.222536] FAULT_INJECTION: forcing a failure. [ 471.222536] name failslab, interval 1, probability 0, space 0, times 0 [ 471.234323] CPU: 0 PID: 26196 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 471.241634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.251014] Call Trace: [ 471.253641] dump_stack+0x172/0x1f0 [ 471.257323] should_fail.cold+0xa/0x1b [ 471.261253] ? security_compute_sid.part.0+0xbea/0x1600 [ 471.266671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.271813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.277396] __should_failslab+0x121/0x190 [ 471.281663] should_failslab+0x9/0x14 [ 471.285507] __kmalloc+0x71/0x740 [ 471.289009] ? context_struct_to_string+0x428/0x880 [ 471.294349] context_struct_to_string+0x428/0x880 [ 471.299234] ? dump_masked_av_helper+0xa0/0xa0 [ 471.303868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.309433] ? sidtab_search_core+0x164/0x210 [ 471.313968] security_sid_to_context_core.isra.0+0x244/0x320 [ 471.319826] security_sid_to_context_force+0x38/0x50 [ 471.324970] selinux_inode_init_security+0x3b6/0x7a0 [ 471.330107] ? selinux_inode_create+0x30/0x30 [ 471.334630] ? lock_downgrade+0x810/0x810 [ 471.338803] ? kasan_check_read+0x11/0x20 [ 471.342981] security_inode_init_security+0x1b3/0x3c0 [ 471.348268] ? ext4_init_acl+0x290/0x290 [ 471.352381] ? security_kernel_load_data+0xb0/0xb0 [ 471.357387] ? posix_acl_create+0x11a/0x430 [ 471.361738] ? lock_downgrade+0x810/0x810 [ 471.365924] ? ext4_set_acl+0x4f0/0x4f0 [ 471.369960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.375557] ? check_preemption_disabled+0x48/0x290 [ 471.380632] ext4_init_security+0x34/0x40 [ 471.384911] __ext4_new_inode+0x3b23/0x52c0 [ 471.389300] ? ext4_free_inode+0x1470/0x1470 [ 471.393750] ? dquot_get_next_dqblk+0x180/0x180 [ 471.398462] ? selinux_determine_inode_label+0x1b1/0x360 [ 471.403976] ext4_mkdir+0x3d5/0xdf0 [ 471.407668] ? ext4_init_dot_dotdot+0x520/0x520 [ 471.412387] ? selinux_inode_mkdir+0x23/0x30 [ 471.416832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.422409] ? security_inode_mkdir+0xee/0x120 [ 471.427038] vfs_mkdir+0x433/0x690 [ 471.430625] do_mkdirat+0x234/0x2a0 [ 471.434310] ? __ia32_sys_mknod+0xb0/0xb0 [ 471.438518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.443323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.448755] ? do_syscall_64+0x26/0x610 [ 471.452772] ? lockdep_hardirqs_on+0x415/0x5d0 [ 471.457484] __x64_sys_mkdir+0x5c/0x80 [ 471.461413] do_syscall_64+0x103/0x610 [ 471.465367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.470607] RIP: 0033:0x457247 [ 471.473829] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.492781] RSP: 002b:00007f8ce30dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 471.500605] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 471.507985] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 471.515294] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 21:32:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3f3}], 0x1, 0x0) 21:32:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03`\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:32:02 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000500)="0af51f023c123f3188a0") mkdir(&(0x7f0000000280)='./file1\x00', 0x10) fcntl$setsig(r0, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') r2 = getegid() getgroups(0x3, &(0x7f0000000480)=[r2, 0xee00, 0x0]) setregid(r3, r4) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) [ 471.522599] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 471.530072] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000003 [ 471.634844] kernel msg: ebtables bug: please report to author: bad policy [ 471.690739] kernel msg: ebtables bug: please report to author: bad policy 21:32:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x3f4}], 0x1, 0x0) 21:32:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0xd, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:02 executing program 1 (fault-call:2 fault-nth:29): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 471.957788] kernel msg: ebtables bug: please report to author: bad policy [ 471.979200] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000203) [ 471.998998] FAT-fs (loop0): Filesystem has been set read-only 21:32:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x402}], 0x1, 0x0) 21:32:02 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000500)="0af51f023c123f3188a0") mkdir(&(0x7f0000000280)='./file1\x00', 0x10) fcntl$setsig(r0, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') r2 = getegid() getgroups(0x3, &(0x7f0000000480)=[r2, 0xee00, 0x0]) setregid(r3, r4) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) [ 472.044359] net_ratelimit: 25 callbacks suppressed [ 472.044368] protocol 88fb is buggy, dev hsr_slave_0 [ 472.049466] protocol 88fb is buggy, dev hsr_slave_1 21:32:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 472.096953] kernel msg: ebtables bug: please report to author: bad policy [ 472.104249] FAULT_INJECTION: forcing a failure. [ 472.104249] name failslab, interval 1, probability 0, space 0, times 0 [ 472.220578] CPU: 1 PID: 26230 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 472.227920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.237308] Call Trace: [ 472.239939] dump_stack+0x172/0x1f0 [ 472.243591] should_fail.cold+0xa/0x1b [ 472.247505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.252647] ? ___might_sleep+0x163/0x280 [ 472.256929] __should_failslab+0x121/0x190 [ 472.261304] should_failslab+0x9/0x14 [ 472.265607] __kmalloc+0x2dc/0x740 [ 472.269318] ? ext4_find_extent+0x76e/0x9d0 [ 472.273782] ext4_find_extent+0x76e/0x9d0 [ 472.278105] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 472.284471] ext4_ext_map_blocks+0x1cc/0x4e50 [ 472.289892] ? ext4_ext_release+0x10/0x10 [ 472.294165] ? __lock_is_held+0xb6/0x140 [ 472.298293] ? lock_acquire+0x16f/0x3f0 [ 472.302331] ? ext4_map_blocks+0x424/0x1a20 [ 472.306707] ext4_map_blocks+0xecb/0x1a20 [ 472.310911] ? ext4_issue_zeroout+0x170/0x170 [ 472.315453] ? kasan_check_write+0x14/0x20 [ 472.319729] ? __brelse+0x95/0xb0 [ 472.323233] ext4_getblk+0xc4/0x510 [ 472.326899] ? ext4_iomap_begin+0xfe0/0xfe0 [ 472.331264] ? ext4_free_inode+0x1470/0x1470 [ 472.335724] ext4_bread+0x8f/0x230 [ 472.339320] ? ext4_getblk+0x510/0x510 [ 472.343285] ext4_append+0x155/0x370 [ 472.347048] ext4_mkdir+0x61b/0xdf0 [ 472.350738] ? ext4_init_dot_dotdot+0x520/0x520 [ 472.355453] ? selinux_inode_mkdir+0x23/0x30 [ 472.359904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.365476] ? security_inode_mkdir+0xee/0x120 [ 472.370102] vfs_mkdir+0x433/0x690 [ 472.373698] do_mkdirat+0x234/0x2a0 [ 472.377367] ? __ia32_sys_mknod+0xb0/0xb0 [ 472.381547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 472.386347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.391743] ? do_syscall_64+0x26/0x610 [ 472.395750] ? lockdep_hardirqs_on+0x415/0x5d0 [ 472.400377] __x64_sys_mkdir+0x5c/0x80 [ 472.404309] do_syscall_64+0x103/0x610 [ 472.404411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.413538] RIP: 0033:0x457247 [ 472.413554] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.413562] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 472.413575] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 472.413583] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 472.413591] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 21:32:03 executing program 2: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000080)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x4) ioctl$ION_IOC_ALLOC(r1, 0xc0184908, &(0x7f0000000000)) 21:32:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x05\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x413}], 0x1, 0x0) 21:32:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 472.413607] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 472.473149] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:32:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b02, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 472.550367] kernel msg: ebtables bug: please report to author: bad policy 21:32:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x416}], 0x1, 0x0) 21:32:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x06\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 472.606644] kernel msg: ebtables bug: please report to author: bad policy [ 472.645165] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000203) 21:32:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x405e, 0x8800) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000200)={r0}) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r1) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x0, 0x3, 0x3}, 0x800}}, 0x18) [ 472.695134] FAT-fs (loop0): Filesystem has been set read-only [ 472.743393] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 472.764359] protocol 88fb is buggy, dev hsr_slave_0 [ 472.769592] protocol 88fb is buggy, dev hsr_slave_1 [ 472.796858] kernel msg: ebtables bug: please report to author: bad policy [ 472.844371] protocol 88fb is buggy, dev hsr_slave_0 [ 472.849512] protocol 88fb is buggy, dev hsr_slave_1 [ 472.854717] protocol 88fb is buggy, dev hsr_slave_0 [ 472.859804] protocol 88fb is buggy, dev hsr_slave_1 21:32:03 executing program 1 (fault-call:2 fault-nth:30): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b03, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:03 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000500)="0af51f023c123f3188a0") mkdir(&(0x7f0000000280)='./file1\x00', 0x10) fcntl$setsig(r0, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') r2 = getegid() getgroups(0x3, &(0x7f0000000480)=[r2, 0xee00, 0x0]) setregid(r3, r4) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) 21:32:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x41f}], 0x1, 0x0) 21:32:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\a\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 472.924366] protocol 88fb is buggy, dev hsr_slave_0 [ 472.929523] protocol 88fb is buggy, dev hsr_slave_1 [ 472.993224] kernel msg: ebtables bug: please report to author: bad policy 21:32:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b04, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 473.041844] kernel msg: ebtables bug: please report to author: bad policy 21:32:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x405e, 0x8800) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000200)={r0}) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r1) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x0, 0x3, 0x3}, 0x800}}, 0x18) 21:32:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x422}], 0x1, 0x0) 21:32:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00 \x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 473.183170] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000203) [ 473.201198] FAT-fs (loop0): Filesystem has been set read-only 21:32:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b05, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000001200)={0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 473.257968] kernel msg: ebtables bug: please report to author: bad policy 21:32:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x429}], 0x1, 0x0) [ 473.301376] kernel msg: ebtables bug: please report to author: bad policy [ 473.371858] FAULT_INJECTION: forcing a failure. [ 473.371858] name failslab, interval 1, probability 0, space 0, times 0 [ 473.383679] CPU: 0 PID: 26302 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 473.390974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.400356] Call Trace: [ 473.402961] dump_stack+0x172/0x1f0 [ 473.406627] should_fail.cold+0xa/0x1b [ 473.410538] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.415678] ? save_stack+0xa9/0xd0 [ 473.419329] ? __es_tree_search.isra.0+0x1bf/0x230 [ 473.424295] __should_failslab+0x121/0x190 [ 473.428554] should_failslab+0x9/0x14 [ 473.432402] kmem_cache_alloc+0x47/0x6f0 [ 473.436509] ? ext4_es_scan+0x6f0/0x6f0 [ 473.440496] ? do_raw_write_lock+0x124/0x290 [ 473.444950] __es_insert_extent+0x2cc/0xf20 [ 473.449321] ext4_es_insert_extent+0x2b7/0xa40 [ 473.453930] ? ext4_es_scan_clu+0x50/0x50 [ 473.458121] ? rcu_read_lock_sched_held+0x110/0x130 [ 473.463159] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 473.468729] ? ext4_es_find_extent_range+0xff/0x600 [ 473.473802] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 473.478674] ? ext4_rereserve_cluster+0x240/0x240 [ 473.483565] ? ext4_find_extent+0x76e/0x9d0 [ 473.487923] ? ext4_find_extent+0x6a6/0x9d0 [ 473.492370] ext4_ext_map_blocks+0x216a/0x4e50 [ 473.496992] ? ext4_ext_release+0x10/0x10 [ 473.501169] ? __lock_is_held+0xb6/0x140 [ 473.505256] ? lock_acquire+0x16f/0x3f0 [ 473.509300] ? ext4_map_blocks+0x424/0x1a20 [ 473.513666] ext4_map_blocks+0xecb/0x1a20 [ 473.517847] ? ext4_issue_zeroout+0x170/0x170 [ 473.517873] ? kasan_check_write+0x14/0x20 [ 473.517892] ? __brelse+0x95/0xb0 [ 473.526649] ext4_getblk+0xc4/0x510 [ 473.526672] ? ext4_iomap_begin+0xfe0/0xfe0 [ 473.526693] ? ext4_free_inode+0x1470/0x1470 [ 473.533799] ext4_bread+0x8f/0x230 [ 473.533817] ? ext4_getblk+0x510/0x510 [ 473.533842] ext4_append+0x155/0x370 [ 473.533867] ext4_mkdir+0x61b/0xdf0 [ 473.557771] ? ext4_init_dot_dotdot+0x520/0x520 [ 473.562835] ? selinux_inode_mkdir+0x23/0x30 [ 473.567295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.572890] ? security_inode_mkdir+0xee/0x120 [ 473.578020] vfs_mkdir+0x433/0x690 [ 473.581693] do_mkdirat+0x234/0x2a0 [ 473.585444] ? __ia32_sys_mknod+0xb0/0xb0 [ 473.589620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.594402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.599797] ? do_syscall_64+0x26/0x610 [ 473.603814] ? lockdep_hardirqs_on+0x415/0x5d0 [ 473.608428] __x64_sys_mkdir+0x5c/0x80 [ 473.612343] do_syscall_64+0x103/0x610 [ 473.616259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.621578] RIP: 0033:0x457247 [ 473.624798] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.643750] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 473.651725] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 473.659043] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 473.666353] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 473.673645] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 473.680942] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 473.727437] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:32:04 executing program 1 (fault-call:2 fault-nth:31): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00?\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x42a}], 0x1, 0x0) 21:32:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x5c1040, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x2f, @broadcast, 0x4e21, 0x3, 'lblcr\x00', 0x39, 0x80000000, 0x30}, 0x2c) io_setup(0x8000, &(0x7f0000000000)=0x0) io_destroy(r1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 21:32:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b06, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:04 executing program 2: r0 = syz_open_dev$usb(0x0, 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663", 0x2b, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x1, r1) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140), 0x4) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r3, 0x0, 0xfd54) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r4 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x0, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x0, 0x35a1c1a3, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x0, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 21:32:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00`\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b08, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x431}], 0x1, 0x0) [ 473.947981] kernel msg: ebtables bug: please report to author: bad policy [ 473.969576] kernel msg: ebtables bug: please report to author: bad policy 21:32:04 executing program 0: syz_emit_ethernet(0x5e, &(0x7f0000000080)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, "6a9831", 0x28, 0x0, 0x0, @initdev, @ipv4, {[@hopopts={0x0, 0x3, [], [@jumbo, @hao={0xc9, 0x10, @ipv4={[], [], @multicast2}}]}], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 474.093446] loop2: p1 < > p4 [ 474.101019] FAULT_INJECTION: forcing a failure. [ 474.101019] name failslab, interval 1, probability 0, space 0, times 0 [ 474.121264] loop2: partition table partially beyond EOD, truncated [ 474.152546] CPU: 1 PID: 26331 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 474.159874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.159881] Call Trace: [ 474.159907] dump_stack+0x172/0x1f0 [ 474.159929] should_fail.cold+0xa/0x1b [ 474.159948] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.178449] kernel msg: ebtables bug: please report to author: bad policy [ 474.179644] ? ___might_sleep+0x163/0x280 [ 474.179668] __should_failslab+0x121/0x190 [ 474.200110] should_failslab+0x9/0x14 [ 474.203940] __kmalloc+0x2dc/0x740 [ 474.207506] ? ext4_find_extent+0x76e/0x9d0 [ 474.207526] ext4_find_extent+0x76e/0x9d0 [ 474.207549] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 474.207569] ext4_ext_map_blocks+0x1cc/0x4e50 [ 474.207596] ? ext4_ext_release+0x10/0x10 [ 474.207621] ? __lock_is_held+0xb6/0x140 [ 474.219163] loop2: p1 size 2 extends beyond EOD, truncated [ 474.221666] ? lock_acquire+0x16f/0x3f0 [ 474.221687] ? ext4_map_blocks+0x884/0x1a20 [ 474.221714] ext4_map_blocks+0x8ec/0x1a20 [ 474.248509] ? ext4_issue_zeroout+0x170/0x170 [ 474.248535] ? kasan_check_write+0x14/0x20 [ 474.248551] ? __brelse+0x95/0xb0 [ 474.248576] ext4_getblk+0xc4/0x510 [ 474.248598] ? ext4_iomap_begin+0xfe0/0xfe0 [ 474.248626] ? ext4_free_inode+0x1470/0x1470 [ 474.248648] ext4_bread+0x8f/0x230 [ 474.248673] ? ext4_getblk+0x510/0x510 [ 474.277440] ext4_append+0x155/0x370 [ 474.277464] ext4_mkdir+0x61b/0xdf0 [ 474.277488] ? ext4_init_dot_dotdot+0x520/0x520 [ 474.277508] ? selinux_inode_mkdir+0x23/0x30 21:32:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x01\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 474.277524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.277540] ? security_inode_mkdir+0xee/0x120 [ 474.277560] vfs_mkdir+0x433/0x690 [ 474.277583] do_mkdirat+0x234/0x2a0 [ 474.277604] ? __ia32_sys_mknod+0xb0/0xb0 [ 474.277621] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 474.277640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.277655] ? do_syscall_64+0x26/0x610 [ 474.277675] ? lockdep_hardirqs_on+0x415/0x5d0 [ 474.292563] __x64_sys_mkdir+0x5c/0x80 [ 474.292585] do_syscall_64+0x103/0x610 [ 474.292609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.292623] RIP: 0033:0x457247 [ 474.292641] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.292650] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 474.292666] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 474.292680] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 21:32:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b0d, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 474.312185] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 474.312195] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 474.312213] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 474.420644] kernel msg: ebtables bug: please report to author: bad policy [ 474.466225] loop2: p4 start 1854537728 is beyond EOD, truncated [ 474.675342] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 21:32:05 executing program 1 (fault-call:2 fault-nth:32): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x02\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:32:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000080)={{0x21, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mq_open(&(0x7f0000000240)='vboxnet0vmnet0\x00', 0x40, 0x40, &(0x7f00000002c0)={0x7, 0x5, 0x7ff, 0x0, 0x5, 0x3, 0x9, 0x7fff}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0x10, &(0x7f0000000080)={&(0x7f0000000100)=@canfd={{0x4, 0x7, 0x0, 0xff}, 0xc, 0x2, 0x0, 0x0, "32dc44c6ed354574718a51b49202bdbee96590cd1d9d9495c99934c47ae21281bdea07c96adfbd94012f8eca4d3487d31584ce1669db862fa754ad6d6413dcb9"}, 0x48}, 0x1, 0x0, 0x0, 0x40007fd}, 0x4004) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x712, 0x581000) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000200)={'baO\xbb\xce\x01c\x17R x\xa7\"\x00', @random="01003a1e2410"}) 21:32:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x434}], 0x1, 0x0) 21:32:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b28, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 474.816259] kernel msg: ebtables bug: please report to author: bad policy 21:32:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x4001) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {0x0}]}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x6d8, 0x3a8, 0x3a8, 0x3a8, 0x270, 0x3a8, 0x608, 0x608, 0x608, 0x608, 0x608, 0x5, &(0x7f0000000180), {[{{@uncond, 0x0, 0x228, 0x270, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x8, 0x3, 0x5, 0x2, 0x20, 0x7, [@remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @mcast2, @remote, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @empty, @mcast1, @local, @remote, @remote], 0xb}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x0, 0x4}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x1, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @gre_key=0x7, @port=0x4e22}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x8, 0x8, 0x8, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x8, @ipv6=@remote, @ipv4=@multicast1, @port=0x4e24, @port=0x4e24}}}, {{@ipv6={@mcast2, @mcast1, [0xffffffff, 0xffffff00, 0xffffff00, 0xffffff00], [0xff000000, 0x0, 0xff, 0xffffffff], 'ipddp0\x00', 'bond_slave_0\x00', {}, {}, 0x3b, 0x1, 0x5}, 0x0, 0xc8, 0xf8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x6, 0x7, 0x7, 0x1}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x93, 0x1f, 0x400, 0x8, 0x1}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x10, 0x3, 0x4, 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x1, @ipv4=@multicast1, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @port=0x4e21, @icmp_id=0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x738) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000140)={r2, 0x2}) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x2a, 0x29, 0x6, 0x12, 0xb, 0x6, 0x1, 0x55, 0x1}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 21:32:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x43d}], 0x1, 0x0) [ 474.914984] FAULT_INJECTION: forcing a failure. [ 474.914984] name failslab, interval 1, probability 0, space 0, times 0 [ 474.926413] CPU: 1 PID: 26364 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 474.933713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.943096] Call Trace: [ 474.945816] dump_stack+0x172/0x1f0 [ 474.949482] should_fail.cold+0xa/0x1b [ 474.953403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.958538] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 474.963594] ? __es_tree_search.isra.0+0x1bf/0x230 [ 474.968566] __should_failslab+0x121/0x190 [ 474.972868] should_failslab+0x9/0x14 [ 474.976697] kmem_cache_alloc+0x47/0x6f0 [ 474.980785] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 474.985829] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 474.991293] ? ext4_es_scan+0x6f0/0x6f0 [ 474.991310] ? do_raw_write_lock+0x124/0x290 [ 474.991330] __es_insert_extent+0x2cc/0xf20 [ 474.991355] ext4_es_insert_extent+0x2b7/0xa40 [ 475.006941] kernel msg: ebtables bug: please report to author: bad policy [ 475.008666] ? ext4_es_scan_clu+0x50/0x50 [ 475.008700] ext4_map_blocks+0xba2/0x1a20 [ 475.022268] ? ext4_issue_zeroout+0x170/0x170 [ 475.022305] ? kasan_check_write+0x14/0x20 [ 475.022324] ? __brelse+0x95/0xb0 [ 475.038469] kernel msg: ebtables bug: please report to author: bad policy [ 475.038748] ext4_getblk+0xc4/0x510 [ 475.049360] ? ext4_iomap_begin+0xfe0/0xfe0 [ 475.053730] ? ext4_free_inode+0x1470/0x1470 [ 475.058180] ext4_bread+0x8f/0x230 [ 475.061761] ? ext4_getblk+0x510/0x510 [ 475.065699] ext4_append+0x155/0x370 [ 475.069457] ext4_mkdir+0x61b/0xdf0 [ 475.073139] ? ext4_init_dot_dotdot+0x520/0x520 [ 475.077851] ? selinux_inode_mkdir+0x23/0x30 [ 475.082304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.087963] ? security_inode_mkdir+0xee/0x120 [ 475.092672] vfs_mkdir+0x433/0x690 [ 475.096260] do_mkdirat+0x234/0x2a0 [ 475.099931] ? __ia32_sys_mknod+0xb0/0xb0 [ 475.104122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.108914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.114342] ? do_syscall_64+0x26/0x610 [ 475.118357] ? lockdep_hardirqs_on+0x415/0x5d0 [ 475.122985] __x64_sys_mkdir+0x5c/0x80 [ 475.126908] do_syscall_64+0x103/0x610 [ 475.130838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.136158] RIP: 0033:0x457247 [ 475.139376] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.158309] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 21:32:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x04\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b29, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x4002011, r2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:32:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b2b, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 475.166081] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 475.173404] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 [ 475.180702] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 475.187992] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 475.195370] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 475.315386] kernel msg: ebtables bug: please report to author: bad policy [ 475.354651] kernel msg: ebtables bug: please report to author: bad policy [ 475.414711] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:32:06 executing program 1 (fault-call:2 fault-nth:33): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000340)=ANY=[]) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x8, 0xff, 0x0, 0x1, 0x14, 0x6c, 0x8, 0xffffffffffffffff, 0x0, 0xd6, 0x1e, 0x3}) r4 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="ec0b7f458d5df1f53ac960cd56ead9a431ff24388f4be45890f7aa0ab32bd66bb55c63dc0c86fa5e1db54539d08e84d558015bebfe5bb18dabdeab8526136ec9253fa2d9a02779a0152389eda37626cf758a0ea87982942f9f617bfbab5dc8913856dcd316be5a0c5e03de"], &(0x7f0000000440)=0x6) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x42042, 0x0) write$selinux_access(r5, &(0x7f00000002c0)={'system_u:object_r:var_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xfffffffffffffe56}, 0x5e) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) 21:32:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0xfffffffffffffffe, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x3f, &(0x7f00000000c0)=""/192, &(0x7f0000000180)=0xc0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x5000aea5, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x0, 0x4b564d03], [0xc1]}) 21:32:06 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x43e}], 0x1, 0x0) 21:32:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b2c, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x05\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 475.610349] kernel msg: ebtables bug: please report to author: bad policy 21:32:06 executing program 2: ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) remap_file_pages(&(0x7f000060d000/0x1000)=nil, 0x1000, 0x2000000, 0x6, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) recvmmsg(r1, &(0x7f0000006600)=[{{&(0x7f0000000000)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000480)=""/185, 0xb9}], 0x3, &(0x7f0000000540)=""/4096, 0x1000, 0x80000001}, 0x4}, {{&(0x7f0000001540)=@in, 0x80, &(0x7f0000000340)=[{&(0x7f00000015c0)=""/228, 0xe4}], 0x1, 0x0, 0x0, 0x6}, 0x8}, {{&(0x7f0000001880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/175, 0xaf}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x3, &(0x7f0000002ac0)=""/4096, 0x1000, 0x3b}}, {{&(0x7f0000003ac0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000003b40)=""/134, 0x86}, {&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/68, 0x44}, {&(0x7f0000004c80)=""/134, 0x86}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f0000005d40)=""/98, 0x62}], 0x6, &(0x7f0000005e40)=""/54, 0x36, 0xff}, 0x40000}, {{&(0x7f0000005e80)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000006300)=[{&(0x7f0000005f00)=""/240, 0xf0}, {&(0x7f0000006000)=""/55, 0x37}, {&(0x7f0000006040)=""/104, 0x68}, {&(0x7f00000060c0)=""/67, 0x43}, {&(0x7f0000006140)=""/116, 0x74}, {&(0x7f00000061c0)=""/221, 0xdd}, {&(0x7f00000062c0)=""/52, 0x34}], 0x7, &(0x7f0000006380)=""/56, 0x38, 0x4}, 0x5}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f00000063c0)=""/146, 0x92}, {&(0x7f0000006480)=""/69, 0x45}], 0x2, &(0x7f0000006540)=""/139, 0x8b, 0x8}, 0x1}], 0x6, 0x2000, &(0x7f0000006780)={0x0, 0x1c9c380}) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000002c0), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) write$binfmt_misc(r3, &(0x7f0000000440)={'syz1'}, 0x1200e) execve(&(0x7f0000001700)='./file0\x00', &(0x7f0000001780)=[&(0x7f0000001740)='syz1'], &(0x7f0000006880)=[&(0x7f00000017c0)='sysadm_u\x00', &(0x7f0000001800)='*(keyring\x00', &(0x7f0000001840)='\x00', &(0x7f00000067c0)='system_u:object_r:netlabel_mgmt_exec_t:s0', &(0x7f0000006800)='cgroup.type\x00', &(0x7f0000006840)='vboxnet0#\x00']) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000016c0)={'bpq0\x00', {0x2, 0x4e24, @multicast2}}) write$selinux_user(r1, &(0x7f0000000100)={'system_u:object_r:netlabel_mgmt_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x33) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f00000068c0)={&(0x7f0000987000/0x4000)=nil, &(0x7f0000cbd000/0x1000)=nil, 0x4000, 0x1}) modify_ldt$read(0x0, &(0x7f0000000380)=""/190, 0xbe) 21:32:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b2f, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:06 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x44a}], 0x1, 0x0) [ 475.707388] FAULT_INJECTION: forcing a failure. [ 475.707388] name failslab, interval 1, probability 0, space 0, times 0 [ 475.718770] CPU: 0 PID: 26411 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 475.726092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.726099] Call Trace: [ 475.726126] dump_stack+0x172/0x1f0 [ 475.726145] should_fail.cold+0xa/0x1b [ 475.726162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.726176] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 475.726199] ? __es_tree_search.isra.0+0x1bf/0x230 [ 475.726236] __should_failslab+0x121/0x190 [ 475.741933] should_failslab+0x9/0x14 [ 475.741951] kmem_cache_alloc+0x47/0x6f0 [ 475.741971] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 475.778111] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 475.782900] ? ext4_es_scan+0x6f0/0x6f0 [ 475.786904] ? do_raw_write_lock+0x124/0x290 [ 475.791353] __es_insert_extent+0x2cc/0xf20 [ 475.795722] ext4_es_insert_extent+0x2b7/0xa40 [ 475.800350] ? ext4_es_scan_clu+0x50/0x50 [ 475.800384] ext4_map_blocks+0xba2/0x1a20 [ 475.800408] ? ext4_issue_zeroout+0x170/0x170 [ 475.800429] ? kasan_check_write+0x14/0x20 [ 475.818180] ? __brelse+0x95/0xb0 [ 475.821704] ext4_getblk+0xc4/0x510 [ 475.821725] ? ext4_iomap_begin+0xfe0/0xfe0 [ 475.821745] ? ext4_free_inode+0x1470/0x1470 [ 475.821765] ext4_bread+0x8f/0x230 [ 475.837743] ? ext4_getblk+0x510/0x510 [ 475.837771] ext4_append+0x155/0x370 [ 475.837796] ext4_mkdir+0x61b/0xdf0 [ 475.849075] ? ext4_init_dot_dotdot+0x520/0x520 [ 475.853796] ? selinux_inode_mkdir+0x23/0x30 [ 475.858252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.863849] ? security_inode_mkdir+0xee/0x120 [ 475.868510] vfs_mkdir+0x433/0x690 [ 475.872185] do_mkdirat+0x234/0x2a0 [ 475.875886] ? __ia32_sys_mknod+0xb0/0xb0 [ 475.880254] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.885234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.890631] ? do_syscall_64+0x26/0x610 [ 475.894656] ? lockdep_hardirqs_on+0x415/0x5d0 [ 475.899293] __x64_sys_mkdir+0x5c/0x80 [ 475.903238] do_syscall_64+0x103/0x610 [ 475.907168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.912383] RIP: 0033:0x457247 [ 475.915607] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.934613] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 475.942348] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 475.949644] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040 21:32:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b3c, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 475.956948] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 475.964290] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 475.971595] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 475.981370] kernel msg: ebtables bug: please report to author: bad policy 21:32:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x06\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b60, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 476.054430] mmap: syz-executor.2 (26423) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 476.149208] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 476.176249] kernel msg: ebtables bug: please report to author: bad policy 21:32:07 executing program 1 (fault-call:2 fault-nth:34): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x44b}], 0x1, 0x0) 21:32:07 executing program 0: r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) ftruncate(r0, 0xfff) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") poll(&(0x7f00000002c0)=[{r1}], 0x1, 0x82) 21:32:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\a\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x20300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x101000) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0xde, 0x800, @name="af3d495c20d2b465e6ee58805142eb3a2147d335faa45cecc1a3ecf4df983903"}) [ 476.402311] FAULT_INJECTION: forcing a failure. [ 476.402311] name failslab, interval 1, probability 0, space 0, times 0 [ 476.413577] CPU: 0 PID: 26444 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 476.420872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.430239] Call Trace: [ 476.432866] dump_stack+0x172/0x1f0 [ 476.436519] should_fail.cold+0xa/0x1b [ 476.440442] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.445594] ? __sigqueue_alloc+0x173/0x4d0 [ 476.449946] ? find_held_lock+0x35/0x130 [ 476.454036] __should_failslab+0x121/0x190 [ 476.454057] should_failslab+0x9/0x14 [ 476.454075] kmem_cache_alloc+0x47/0x6f0 [ 476.462252] ? kasan_check_read+0x11/0x20 [ 476.470558] __sigqueue_alloc+0x268/0x4d0 [ 476.474764] __send_signal+0xda3/0x1590 [ 476.478780] send_signal+0x49/0xd0 [ 476.482349] force_sig_info+0x251/0x310 [ 476.486369] force_sig_fault+0xbb/0xf0 [ 476.490300] ? force_sigsegv+0x120/0x120 [ 476.494404] ? trace_hardirqs_on+0x67/0x230 [ 476.498764] __bad_area_nosemaphore+0x332/0x420 [ 476.503559] bad_area+0x69/0x80 [ 476.506885] __do_page_fault+0x971/0xd60 [ 476.510990] do_page_fault+0x71/0x581 [ 476.514833] ? page_fault+0x8/0x30 [ 476.518761] page_fault+0x1e/0x30 [ 476.522246] RIP: 0033:0x451adf [ 476.525486] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 476.544668] RSP: 002b:00007f8ce311fa88 EFLAGS: 00010283 21:32:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x44c}], 0x1, 0x0) 21:32:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x7ffff000, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0xfffffdef, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 476.550055] RAX: 00007f8ce311fb30 RBX: 0000000000000010 RCX: 0000000000000000 [ 476.557356] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f8ce311fb30 [ 476.564735] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 476.564745] R10: 0000000000000075 R11: 00000000004e1060 R12: 0000000000000005 [ 476.564753] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 476.590471] kernel msg: ebtables bug: please report to author: bad policy [ 476.599629] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 476.627822] kernel msg: ebtables bug: please report to author: bad policy 21:32:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x460}], 0x1, 0x0) 21:32:07 executing program 1 (fault-call:2 fault-nth:35): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00?\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 476.799947] kernel msg: ebtables bug: please report to author: bad policy 21:32:07 executing program 0: ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f00000001c0), 0x4) r4 = semget$private(0x0, 0x3, 0x3) getsockname$inet(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f0000000240)=0x10) semtimedop(r4, &(0x7f0000000800)=[{0xfffffffffffffffd, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x0, 0x989680}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000002c0)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r3, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5fb62d3f2ed2eea2480d6525417bd176b15974760833140803ed3080cb1ea09851b99c30ad32b6388ca48e6", 0x159, 0x10000}], 0x0, 0x0) close(r1) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000000)=""/117) 21:32:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 476.905718] FAULT_INJECTION: forcing a failure. [ 476.905718] name failslab, interval 1, probability 0, space 0, times 0 [ 476.908574] libceph: connect [d::]:6789 error -101 [ 476.934201] libceph: mon0 [d::]:6789 connect error [ 476.953030] libceph: connect [d::]:6789 error -101 [ 476.964467] CPU: 1 PID: 26478 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 476.971897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.981273] Call Trace: [ 476.983908] dump_stack+0x172/0x1f0 [ 476.987589] should_fail.cold+0xa/0x1b [ 476.992229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.997377] ? lock_downgrade+0x810/0x810 [ 477.001577] ? ___might_sleep+0x163/0x280 [ 477.005794] __should_failslab+0x121/0x190 [ 477.010089] should_failslab+0x9/0x14 [ 477.013933] __kmalloc_track_caller+0x2d8/0x740 [ 477.018649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 477.024321] ? strndup_user+0x77/0xd0 [ 477.028292] memdup_user+0x26/0xb0 [ 477.031875] strndup_user+0x77/0xd0 [ 477.035569] ksys_mount+0x7b/0x150 [ 477.039154] __x64_sys_mount+0xbe/0x150 [ 477.039176] do_syscall_64+0x103/0x610 [ 477.039197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.039210] RIP: 0033:0x45a89a 21:32:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x463}], 0x1, 0x0) [ 477.039226] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 477.039234] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 477.039253] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 477.052481] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 477.052491] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 477.052499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 477.052509] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 477.060077] libceph: mon0 [d::]:6789 connect error [ 477.129300] kernel msg: ebtables bug: please report to author: bad policy [ 477.171778] kernel msg: ebtables bug: please report to author: bad policy [ 477.210918] BTRFS: device label >ÐÕûbÓòí.ê$€ÖRT½k—G`ƒ1@€>Ó ±ê …™Ã [ 477.210918] Ó+cˆÊHæ devid 17487635432702809553 transid 756082810144684242 /dev/loop0 [ 477.244387] net_ratelimit: 22 callbacks suppressed [ 477.244402] protocol 88fb is buggy, dev hsr_slave_0 [ 477.254562] protocol 88fb is buggy, dev hsr_slave_1 [ 477.317099] BTRFS error (device loop0): unsupported checksum algorithm 22813 [ 477.328268] libceph: connect [d::]:6789 error -101 [ 477.333382] libceph: mon0 [d::]:6789 connect error 21:32:08 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x101000) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0xde, 0x800, @name="af3d495c20d2b465e6ee58805142eb3a2147d335faa45cecc1a3ecf4df983903"}) 21:32:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00`\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x3], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:08 executing program 1 (fault-call:2 fault-nth:36): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x46c}], 0x1, 0x0) [ 477.370398] BTRFS error (device loop0): superblock checksum mismatch [ 477.413978] BTRFS error (device loop0): open_ctree failed [ 477.477190] kernel msg: ebtables bug: please report to author: bad policy [ 477.516534] FAULT_INJECTION: forcing a failure. 21:32:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x46f}], 0x1, 0x0) 21:32:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x4], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 477.516534] name failslab, interval 1, probability 0, space 0, times 0 [ 477.527792] CPU: 1 PID: 26514 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 477.527804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.527808] Call Trace: [ 477.527838] dump_stack+0x172/0x1f0 [ 477.527862] should_fail.cold+0xa/0x1b [ 477.527881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.527896] ? __sigqueue_alloc+0x173/0x4d0 [ 477.527912] ? find_held_lock+0x35/0x130 [ 477.527938] __should_failslab+0x121/0x190 [ 477.527960] should_failslab+0x9/0x14 [ 477.527979] kmem_cache_alloc+0x47/0x6f0 [ 477.546775] kernel msg: ebtables bug: please report to author: bad policy [ 477.547243] ? kasan_check_read+0x11/0x20 [ 477.591511] __sigqueue_alloc+0x268/0x4d0 [ 477.595678] __send_signal+0xda3/0x1590 [ 477.599688] send_signal+0x49/0xd0 [ 477.603259] force_sig_info+0x251/0x310 [ 477.607292] force_sig_fault+0xbb/0xf0 [ 477.611269] ? force_sigsegv+0x120/0x120 [ 477.615404] ? trace_hardirqs_on+0x67/0x230 [ 477.619832] __bad_area_nosemaphore+0x332/0x420 [ 477.624526] bad_area+0x69/0x80 [ 477.627822] __do_page_fault+0x971/0xd60 [ 477.631905] do_page_fault+0x71/0x581 [ 477.635716] ? page_fault+0x8/0x30 [ 477.639269] page_fault+0x1e/0x30 [ 477.642742] RIP: 0033:0x451adf [ 477.645945] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 477.664862] RSP: 002b:00007f8ce311fa88 EFLAGS: 00010283 [ 477.664876] RAX: 00007f8ce311fb30 RBX: 0000000000000010 RCX: 0000000000000000 21:32:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 477.664884] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f8ce311fb30 [ 477.664891] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 477.664898] R10: 0000000000000075 R11: 00000000004e1060 R12: 0000000000000005 [ 477.664907] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 477.801598] kernel msg: ebtables bug: please report to author: bad policy [ 477.809846] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 21:32:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x5], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 477.852212] kernel msg: ebtables bug: please report to author: bad policy 21:32:08 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x214402, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x2}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x800, 0x0) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x6b, 0x10480) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @remote, 'veth0_to_bridge\x00'}}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x3, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000400)={r2, r1, 0x7f, 0xea, &(0x7f0000000300)="2ae28ea87eb8b0dba05c3a4c866682bfdb8f2632fb64ca3c62c8c69d4eb3eaf38f9359d0f9c82496f89e479c8ab4f4711b9df05ad0b3d34c025fd23c4353524900c9bc540056f56931e0fec1002f1a59025f90d23efe0ee2c111191182d7322cd5ddfabb5cdbbc65f91a4b8e4f537ff58ec490404ee5c2cb59e22c37ace7baadb1379f0bb1217557f35549feed3c4b96c1b78eacc7aa204c8c9c39c7e2fcacd89c41e32b77856bff42184e19208f2974c578a2d8221fe6efd8b3bf95a7995fb7d9ed64a96148f387273009885868cdd5d312817a3a9c3c571bad94e3b47673a489b77a77a72097c6d66a", 0x81, 0x800, 0x2, 0x101, 0x3f, 0x2, 0x100000000, 'syz0\x00'}) 21:32:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x479}], 0x1, 0x0) [ 478.026863] kernel msg: ebtables bug: please report to author: bad policy [ 478.044351] protocol 88fb is buggy, dev hsr_slave_0 [ 478.049618] protocol 88fb is buggy, dev hsr_slave_1 [ 478.063874] kernel msg: ebtables bug: please report to author: bad policy 21:32:08 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x42000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpgrp(0xffffffffffffffff) mknod(&(0x7f0000000080)='./file0\x00', 0x1809, 0x7fffffff) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x113) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x80000) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) socket$inet6(0xa, 0x2, 0x0) timer_create(0x800020000000, 0x0, &(0x7f00000002c0)) timer_getoverrun(0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:32:08 executing program 1 (fault-call:2 fault-nth:37): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x6], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x47a}], 0x1, 0x0) 21:32:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:32:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000000c0)={0x9, {{0xa, 0x4e21, 0x0, @mcast2, 0x8}}}, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) sched_setattr(r2, &(0x7f0000000200)={0x30, 0x0, 0x1, 0x6, 0x56, 0x1, 0x2, 0xffffffffffffffff}, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f00000006c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,cast6)\x00'}, 0x58) [ 478.284366] protocol 88fb is buggy, dev hsr_slave_0 [ 478.289530] protocol 88fb is buggy, dev hsr_slave_1 [ 478.312844] FAULT_INJECTION: forcing a failure. [ 478.312844] name failslab, interval 1, probability 0, space 0, times 0 [ 478.326393] kernel msg: ebtables bug: please report to author: bad policy 21:32:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x484}], 0x1, 0x0) [ 478.373966] kernel msg: ebtables bug: please report to author: bad policy [ 478.387320] CPU: 0 PID: 26556 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 478.394634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.404013] Call Trace: [ 478.406635] dump_stack+0x172/0x1f0 [ 478.410308] should_fail.cold+0xa/0x1b [ 478.414221] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.419524] ? lock_downgrade+0x810/0x810 [ 478.423693] ? ___might_sleep+0x163/0x280 [ 478.427865] __should_failslab+0x121/0x190 [ 478.432152] should_failslab+0x9/0x14 [ 478.435978] __kmalloc_track_caller+0x2d8/0x740 [ 478.440671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 478.446242] ? strndup_user+0x77/0xd0 [ 478.450509] memdup_user+0x26/0xb0 [ 478.454073] strndup_user+0x77/0xd0 [ 478.457728] ksys_mount+0x7b/0x150 [ 478.461304] __x64_sys_mount+0xbe/0x150 [ 478.465319] do_syscall_64+0x103/0x610 [ 478.469235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.474447] RIP: 0033:0x45a89a [ 478.477664] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 478.496676] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 478.504408] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 478.511700] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 21:32:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x8], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 478.518990] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 478.526289] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 478.533591] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:32:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x487}], 0x1, 0x0) 21:32:09 executing program 1 (fault-call:2 fault-nth:38): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0xd], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 478.721033] kernel msg: ebtables bug: please report to author: bad policy [ 478.753338] kernel msg: ebtables bug: please report to author: bad policy [ 478.802348] FAULT_INJECTION: forcing a failure. [ 478.802348] name failslab, interval 1, probability 0, space 0, times 0 [ 478.814725] CPU: 0 PID: 26594 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 478.822026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.831400] Call Trace: [ 478.834026] dump_stack+0x172/0x1f0 [ 478.837677] should_fail.cold+0xa/0x1b [ 478.841602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.846724] ? lock_downgrade+0x810/0x810 [ 478.850890] ? ___might_sleep+0x163/0x280 [ 478.855061] __should_failslab+0x121/0x190 [ 478.859327] should_failslab+0x9/0x14 [ 478.863138] __kmalloc_track_caller+0x2d8/0x740 [ 478.867824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 478.873391] ? strndup_user+0x77/0xd0 [ 478.877210] memdup_user+0x26/0xb0 [ 478.880772] strndup_user+0x77/0xd0 [ 478.884912] ksys_mount+0x7b/0x150 [ 478.888475] __x64_sys_mount+0xbe/0x150 [ 478.892470] do_syscall_64+0x103/0x610 [ 478.896379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.901591] RIP: 0033:0x45a89a [ 478.904799] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 478.923715] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 478.931440] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 478.938725] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 478.946009] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 478.953305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 478.960591] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 479.004338] protocol 88fb is buggy, dev hsr_slave_0 [ 479.009468] protocol 88fb is buggy, dev hsr_slave_1 [ 479.084380] protocol 88fb is buggy, dev hsr_slave_0 [ 479.089578] protocol 88fb is buggy, dev hsr_slave_1 21:32:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4$x25(r4, 0x0, 0x0, 0x800) r5 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x9}, 0x90) 21:32:09 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x8}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, 0x0, 0xffffffffffffff1f}, 0x0) perf_event_open(&(0x7f0000000180)={0x100000002, 0x70, 0xfffffffffffffffc, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x9, 0x0, 0x10001, 0x4575}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000040)={0x0, r1}) 21:32:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x28], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x488}], 0x1, 0x0) 21:32:09 executing program 1 (fault-call:2 fault-nth:39): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 479.327401] FAULT_INJECTION: forcing a failure. [ 479.327401] name failslab, interval 1, probability 0, space 0, times 0 [ 479.336056] kernel msg: ebtables bug: please report to author: bad policy 21:32:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 479.371879] CPU: 1 PID: 26610 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 479.379211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.388578] Call Trace: [ 479.391193] dump_stack+0x172/0x1f0 [ 479.394853] should_fail.cold+0xa/0x1b [ 479.398769] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.403895] ? lock_downgrade+0x810/0x810 [ 479.408073] ? ___might_sleep+0x163/0x280 [ 479.412251] __should_failslab+0x121/0x190 [ 479.416526] should_failslab+0x9/0x14 [ 479.420369] kmem_cache_alloc+0x2b2/0x6f0 [ 479.424539] ? fs_reclaim_acquire+0x20/0x20 [ 479.428881] ? find_held_lock+0x35/0x130 [ 479.432971] getname_flags+0xd6/0x5b0 [ 479.436808] user_path_at_empty+0x2f/0x50 [ 479.440987] do_mount+0x15e/0x2d30 [ 479.444557] ? copy_mount_options+0x5c/0x3a0 [ 479.449003] ? copy_mount_string+0x40/0x40 [ 479.453269] ? kmem_cache_alloc_trace+0x354/0x760 [ 479.458242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 479.463826] ? _copy_from_user+0xdd/0x150 [ 479.468004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.473579] ? copy_mount_options+0x280/0x3a0 [ 479.478120] ksys_mount+0xdb/0x150 [ 479.481695] __x64_sys_mount+0xbe/0x150 [ 479.485709] do_syscall_64+0x103/0x610 [ 479.489625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.494836] RIP: 0033:0x45a89a [ 479.498049] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 21:32:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x29], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x495}], 0x1, 0x0) [ 479.516974] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 479.525055] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 479.532367] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 479.539684] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 479.546983] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 479.554982] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:32:10 executing program 1 (fault-call:2 fault-nth:40): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x496}], 0x1, 0x0) [ 479.681310] kernel msg: ebtables bug: please report to author: bad policy 21:32:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x100082) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000009c0)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/107, 0x6b}, {&(0x7f0000000b40)=""/38, 0x26}], 0x2, &(0x7f0000000240)=""/135, 0x87}, 0x40}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/233, 0xe9}, {&(0x7f0000000400)=""/68, 0x44}, {&(0x7f0000000480)=""/168, 0xa8}, {&(0x7f0000000540)=""/76, 0x4c}], 0x4}, 0x7}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000700)=""/107, 0x6b}, {&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/166, 0xa6}, {&(0x7f0000000880)=""/104, 0x68}], 0x5, &(0x7f0000000980)=""/20, 0x14}, 0x8}], 0x3, 0x102, &(0x7f0000000a80)={0x77359400}) bind$nfc_llcp(r3, &(0x7f0000000ac0)={0x27, 0x1, 0x1, 0x6, 0x7, 0x1, "91b77188f6ad8d9cbaea00dc81363f1499fa0a7d80ef19d4917d83f738f3cbd56255b8564ffa3bffe4c710c30e956fa4f2c0c12950c84b4fd5e623b3fe6f08", 0x1b}, 0x60) socket$key(0xf, 0x3, 0x2) r4 = socket$key(0xf, 0x3, 0x2) dup3(r1, r4, 0x0) socket$caif_stream(0x25, 0x1, 0x4) [ 479.795526] FAULT_INJECTION: forcing a failure. [ 479.795526] name failslab, interval 1, probability 0, space 0, times 0 [ 479.825365] CPU: 1 PID: 26742 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 479.832708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.842096] Call Trace: [ 479.844722] dump_stack+0x172/0x1f0 [ 479.848381] should_fail.cold+0xa/0x1b [ 479.852318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.857455] ? lock_downgrade+0x810/0x810 [ 479.861632] ? ___might_sleep+0x163/0x280 [ 479.865814] __should_failslab+0x121/0x190 [ 479.870088] should_failslab+0x9/0x14 [ 479.873913] kmem_cache_alloc+0x2b2/0x6f0 [ 479.878087] ? find_held_lock+0x35/0x130 [ 479.882333] getname_kernel+0x53/0x370 [ 479.886247] kern_path+0x20/0x40 [ 479.889650] lookup_bdev.part.0+0x7b/0x1b0 [ 479.893901] ? blkdev_open+0x290/0x290 [ 479.897848] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 479.903341] ? rcu_read_lock_sched_held+0x110/0x130 [ 479.908373] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 479.913934] blkdev_get_by_path+0x81/0x130 [ 479.918190] mount_bdev+0x5d/0x3c0 [ 479.921809] ? finish_unfinished+0x1120/0x1120 [ 479.926425] get_super_block+0x35/0x40 [ 479.930339] mount_fs+0x106/0x3ff [ 479.933831] ? emergency_thaw_all+0x1a0/0x1a0 [ 479.938351] ? __init_waitqueue_head+0x36/0x90 [ 479.942973] vfs_kern_mount.part.0+0x6f/0x410 [ 479.947500] do_mount+0x581/0x2d30 [ 479.951065] ? finish_automount+0x481/0x490 [ 479.955430] ? copy_mount_string+0x40/0x40 [ 479.959775] ? kmem_cache_alloc_trace+0x354/0x760 [ 479.964647] ? _copy_from_user+0xdd/0x150 [ 479.968827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.974387] ? copy_mount_options+0x280/0x3a0 [ 479.978941] ksys_mount+0xdb/0x150 [ 479.982503] __x64_sys_mount+0xbe/0x150 [ 479.986505] do_syscall_64+0x103/0x610 [ 479.990976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.996187] RIP: 0033:0x45a89a [ 479.999395] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 480.018462] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.026379] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 480.033677] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 480.040993] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 480.048304] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 480.055602] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:32:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="3c01000010002100000000000000000000000000000000000000000000000000ff01000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880000000000000000000000000000000000003c000000fe88000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ec65000000000000000000000000000000000000000000000000004c001400736861312d6365000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x13c}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) accept4$llc(r1, 0x0, &(0x7f0000000040), 0x80000) pselect6(0x40, &(0x7f0000000080)={0x84, 0x7, 0x9, 0x6, 0x7, 0x2, 0x4}, &(0x7f00000000c0)={0x3, 0x2, 0x80000000, 0x1, 0x7, 0x20, 0x1}, &(0x7f0000000100)={0x8, 0x1000, 0x6, 0x9, 0x5, 0x6ad8, 0x3a, 0xfffffffffffffffc}, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f0000000180)={0x1}, 0x8}) 21:32:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x2b], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) 21:32:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x497}], 0x1, 0x0) 21:32:11 executing program 1 (fault-call:2 fault-nth:41): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 480.336862] kernel msg: ebtables bug: please report to author: bad policy [ 480.362056] FAULT_INJECTION: forcing a failure. [ 480.362056] name failslab, interval 1, probability 0, space 0, times 0 [ 480.383178] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 480.413690] CPU: 0 PID: 26760 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 480.421041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.430423] Call Trace: [ 480.430456] dump_stack+0x172/0x1f0 [ 480.430479] should_fail.cold+0xa/0x1b [ 480.430497] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.430513] ? lock_downgrade+0x810/0x810 [ 480.430532] ? ___might_sleep+0x163/0x280 [ 480.430556] __should_failslab+0x121/0x190 [ 480.445788] should_failslab+0x9/0x14 [ 480.445806] kmem_cache_alloc+0x2b2/0x6f0 [ 480.445821] ? lock_downgrade+0x810/0x810 [ 480.445842] alloc_vfsmnt+0x28/0x780 [ 480.445860] vfs_kern_mount.part.0+0x2a/0x410 [ 480.445880] do_mount+0x581/0x2d30 [ 480.482335] ? finish_automount+0x481/0x490 [ 480.486699] ? copy_mount_string+0x40/0x40 [ 480.490976] ? kmem_cache_alloc_trace+0x354/0x760 [ 480.495865] ? _copy_from_user+0xdd/0x150 [ 480.500050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.505629] ? copy_mount_options+0x280/0x3a0 [ 480.510170] ksys_mount+0xdb/0x150 [ 480.513756] __x64_sys_mount+0xbe/0x150 [ 480.517775] do_syscall_64+0x103/0x610 [ 480.521710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.526928] RIP: 0033:0x45a89a [ 480.530145] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 480.549066] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.556797] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a 21:32:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x2c], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x2f], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x4a9}], 0x1, 0x0) 21:32:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000230000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffff0600ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000008006966623000000000000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b8000000f000000028010000697000000000870000000000000000000000000000000000000000000000000020000000000000007f000001ac10140000000000000000000084300000000a0000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa0000000000000000000000"]}, 0x230) [ 480.564088] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 480.571380] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 480.578689] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 480.585978] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 480.595810] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 21:32:11 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x10000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000004c0)={0x1, 0xfff, 0x80000000}) socket$inet_sctp(0x2, 0x1, 0x84) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x100000000, 0x400c00) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x10002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getpgid(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000280)={'hwsim0\x00', 0x37e4}) syslog(0x4, &(0x7f0000000300)=""/122, 0x7a) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x3ffffffffe) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/keycreate\x00', 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm_plock\x00', 0x70080, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x1, 0x2) unshare(0x40000000) readv(r1, &(0x7f00000003c0)=[{&(0x7f00000007c0)=""/235, 0xeb}], 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000200)={@rand_addr="6738ea3284592adaab5670294897eb7d"}, 0x14) openat$snapshot(0xffffffffffffff9c, 0x0, 0x84, 0x0) socketpair(0x5, 0x80807, 0x5, &(0x7f0000000100)) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000380)=0x4802) sysfs$2(0x2, 0x1, &(0x7f0000000700)=""/183) [ 480.667954] kernel msg: ebtables bug: please report to author: bad policy 21:32:11 executing program 1 (fault-call:2 fault-nth:42): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000200)=0xb1, 0x8, 0x3) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 21:32:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x3c], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) 21:32:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x4ac}], 0x1, 0x0) [ 480.832591] FAULT_INJECTION: forcing a failure. [ 480.832591] name failslab, interval 1, probability 0, space 0, times 0 [ 480.872665] CPU: 1 PID: 26983 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 480.880180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.889909] Call Trace: [ 480.892527] dump_stack+0x172/0x1f0 [ 480.896178] should_fail.cold+0xa/0x1b [ 480.900116] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.905243] ? lock_downgrade+0x810/0x810 [ 480.909469] ? ___might_sleep+0x163/0x280 [ 480.913649] __should_failslab+0x121/0x190 [ 480.917938] should_failslab+0x9/0x14 [ 480.921770] kmem_cache_alloc+0x2b2/0x6f0 [ 480.925945] ? find_held_lock+0x35/0x130 [ 480.930047] getname_kernel+0x53/0x370 [ 480.933984] kern_path+0x20/0x40 [ 480.937385] lookup_bdev.part.0+0x7b/0x1b0 [ 480.941643] ? blkdev_open+0x290/0x290 [ 480.945557] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 480.945574] ? rcu_read_lock_sched_held+0x110/0x130 [ 480.945589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 480.945610] blkdev_get_by_path+0x81/0x130 [ 480.945632] mount_bdev+0x5d/0x3c0 [ 480.945649] ? finish_unfinished+0x1120/0x1120 [ 480.945672] get_super_block+0x35/0x40 [ 480.961707] mount_fs+0x106/0x3ff [ 480.961731] ? emergency_thaw_all+0x1a0/0x1a0 [ 480.985961] ? __init_waitqueue_head+0x36/0x90 [ 480.991048] vfs_kern_mount.part.0+0x6f/0x410 [ 480.995592] do_mount+0x581/0x2d30 [ 480.999177] ? copy_mount_string+0x40/0x40 [ 481.003459] ? copy_mount_options+0x1f8/0x3a0 [ 481.007997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.013578] ? copy_mount_options+0x280/0x3a0 [ 481.018121] ksys_mount+0xdb/0x150 [ 481.021699] __x64_sys_mount+0xbe/0x150 [ 481.025705] do_syscall_64+0x103/0x610 [ 481.029640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.034851] RIP: 0033:0x45a89a [ 481.038078] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 481.057033] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.064814] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 481.072198] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 481.079500] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 481.087847] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 481.095139] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 21:32:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x60], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x4b5}], 0x1, 0x0) 21:32:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0xf0], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300009, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:32:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x6, {}, 0x0, 0x2}, 0xe) [ 481.288171] IPVS: ftp: loaded support on port[0] = 21 21:32:12 executing program 1 (fault-call:2 fault-nth:43): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:32:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x55, 0x1b8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x230) [ 481.442430] FAULT_INJECTION: forcing a failure. [ 481.442430] name failslab, interval 1, probability 0, space 0, times 0 [ 481.482750] CPU: 1 PID: 27120 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #88 [ 481.490102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.490110] Call Trace: [ 481.490140] dump_stack+0x172/0x1f0 [ 481.490161] should_fail.cold+0xa/0x1b [ 481.490182] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.490202] ? lock_downgrade+0x810/0x810 [ 481.490229] ? ___might_sleep+0x163/0x280 [ 481.523438] __should_failslab+0x121/0x190 [ 481.527746] should_failslab+0x9/0x14 [ 481.531582] kmem_cache_alloc+0x2b2/0x6f0 [ 481.535768] ? find_held_lock+0x35/0x130 [ 481.539966] getname_kernel+0x53/0x370 [ 481.543903] kern_path+0x20/0x40 [ 481.547327] lookup_bdev.part.0+0x7b/0x1b0 [ 481.551607] ? blkdev_open+0x290/0x290 [ 481.555529] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 481.561874] ? rcu_read_lock_sched_held+0x110/0x130 [ 481.561892] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 481.561914] blkdev_get_by_path+0x81/0x130 [ 481.561935] mount_bdev+0x5d/0x3c0 [ 481.561953] ? finish_unfinished+0x1120/0x1120 [ 481.561973] get_super_block+0x35/0x40 [ 481.588999] mount_fs+0x106/0x3ff [ 481.589021] ? emergency_thaw_all+0x1a0/0x1a0 [ 481.589040] ? __init_waitqueue_head+0x36/0x90 [ 481.589062] vfs_kern_mount.part.0+0x6f/0x410 [ 481.606582] do_mount+0x581/0x2d30 [ 481.610156] ? finish_automount+0x481/0x490 [ 481.610180] ? copy_mount_string+0x40/0x40 [ 481.610198] ? kmem_cache_alloc_trace+0x354/0x760 [ 481.610221] ? _copy_from_user+0xdd/0x150 [ 481.627825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.633408] ? copy_mount_options+0x280/0x3a0 [ 481.633430] ksys_mount+0xdb/0x150 [ 481.633451] __x64_sys_mount+0xbe/0x150 [ 481.633474] do_syscall_64+0x103/0x610 [ 481.633496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.633510] RIP: 0033:0x45a89a [ 481.633532] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 481.676774] RSP: 002b:00007f8ce311fa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.676792] RAX: ffffffffffffffda RBX: 00007f8ce311fb30 RCX: 000000000045a89a [ 481.676801] RDX: 00007f8ce311fad0 RSI: 0000000020000040 RDI: 00007f8ce311faf0 [ 481.676810] RBP: 0000000020000040 R08: 00007f8ce311fb30 R09: 00007f8ce311fad0 [ 481.676818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 481.676825] R13: 0000000000000000 R14: 00000000004dbdb0 R15: 0000000000000004 [ 482.444403] net_ratelimit: 18 callbacks suppressed [ 482.444412] protocol 88fb is buggy, dev hsr_slave_0 [ 482.454560] protocol 88fb is buggy, dev hsr_slave_1 [ 482.566006] IPVS: ftp: loaded support on port[0] = 21 [ 483.095221] device bridge_slave_1 left promiscuous mode [ 483.100794] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.125201] device bridge_slave_0 left promiscuous mode [ 483.130761] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.164327] protocol 88fb is buggy, dev hsr_slave_0 [ 483.169473] protocol 88fb is buggy, dev hsr_slave_1 [ 483.244395] protocol 88fb is buggy, dev hsr_slave_0 [ 483.249523] protocol 88fb is buggy, dev hsr_slave_1 [ 483.351679] device hsr_slave_1 left promiscuous mode [ 483.389575] device hsr_slave_0 left promiscuous mode [ 483.419847] team0 (unregistering): Port device team_slave_1 removed [ 483.457195] team0 (unregistering): Port device team_slave_0 removed [ 483.484422] protocol 88fb is buggy, dev hsr_slave_0 [ 483.489628] protocol 88fb is buggy, dev hsr_slave_1 [ 483.516243] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 483.539647] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.676221] bond0 (unregistering): Released all slaves [ 483.790024] WARNING: CPU: 1 PID: 10373 at net/batman-adv/multicast.c:371 batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.800865] Kernel panic - not syncing: panic_on_warn set ... [ 483.806787] CPU: 1 PID: 10373 Comm: kworker/u4:6 Not tainted 5.0.0-rc8+ #88 [ 483.813905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.823314] Workqueue: bat_events batadv_mcast_mla_update [ 483.828910] Call Trace: [ 483.831532] dump_stack+0x172/0x1f0 [ 483.835202] ? batadv_mcast_mla_update+0x1920/0x1ec0 [ 483.840449] panic+0x2cb/0x65c [ 483.843687] ? __warn_printk+0xf3/0xf3 [ 483.847616] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.852758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.858337] ? __warn.cold+0x5/0x45 [ 483.862004] ? __warn+0xe8/0x1d0 [ 483.865421] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.870561] __warn.cold+0x20/0x45 [ 483.874148] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.879303] report_bug+0x263/0x2b0 [ 483.883041] do_error_trap+0x11b/0x200 [ 483.887074] do_invalid_op+0x37/0x50 [ 483.890823] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.895963] invalid_op+0x14/0x20 [ 483.899460] RIP: 0010:batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.905204] Code: 00 0f 85 95 05 00 00 4c 3b ad d0 fe ff ff 4c 89 ef 4d 8b 65 00 0f 85 a0 fb ff ff e8 23 29 89 fa e9 a6 ef ff ff e8 19 29 89 fa <0f> 0b e9 64 ec ff ff e8 0d 29 89 fa 8b b5 a8 fe ff ff 31 ff e8 80 [ 483.924137] RSP: 0000:ffff88805292fbc0 EFLAGS: 00010293 [ 483.929530] RAX: ffff88804f708640 RBX: 0000000000000001 RCX: ffffffff86e6a269 [ 483.936825] RDX: 0000000000000000 RSI: ffffffff86e6b607 RDI: 0000000000000007 [ 483.944121] RBP: ffff88805292fd30 R08: ffff88804f708640 R09: ffff88804f708f08 [ 483.951416] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88805292fc98 [ 483.958718] R13: ffff88808db4d290 R14: 0000000000000000 R15: ffff88805292fd08 [ 483.966045] ? batadv_mcast_mla_update+0x589/0x1ec0 [ 483.971120] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 483.976294] ? enable_cpucache.cold+0x4/0x24 [ 483.980757] ? batadv_mcast_querier_log.isra.0+0x140/0x140 [ 483.986435] ? check_preemption_disabled+0x48/0x290 [ 483.991504] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 483.997003] process_one_work+0x98e/0x1790 [ 484.001303] ? pwq_dec_nr_in_flight+0x320/0x320 [ 484.006007] ? lock_acquire+0x16f/0x3f0 [ 484.010042] worker_thread+0x98/0xe40 [ 484.013906] ? trace_hardirqs_on+0x67/0x230 [ 484.018306] kthread+0x357/0x430 [ 484.021723] ? process_one_work+0x1790/0x1790 [ 484.026258] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 484.031846] ret_from_fork+0x3a/0x50 [ 484.037217] Kernel Offset: disabled [ 484.041151] Rebooting in 86400 seconds..